Cross icon
Test your LLM for oversharing!  Test for real-world oversharing risks with role-specific prompts that mimic  real workplace questions. FREE - Start Now
protect icon

A new era requires a new set of solutions
Knostic delivers it

Skip to main content
Skip to main content

Friends are those whose weekend is gone. Whose coming month is gone. Those who will go computer by computer and try to bring the world back online. My heart is with them, in the trenches.

Friends

Then, what of those who had to submit their Ph.D. and its now gone. Or those who just wanted to chat with their grandma today, perhaps for the last time? Or the grandma whose only interest in passing the day is watching a show?

This is about the real basics, and why we’re in cybersecurity to begin with.

Romans

Romans are those who fight about platform vs. best-of-breed. Our biggest lesson from the 90s is actually about monoculture - running the same software everywhere, making us vulnerable to a single attack or failure.

Where infrastructure is concerned, our risk assessment can’t allow that route any longer. We can’t all go down because of one bug. We can’t all run the same software - not always.

The pendulum in 2024 shifted to platforms and ease of management. We must assess infrastructure risk to include catastrophic failures - just like multi-cloud became a much bigger risk after the first major AWS outage.

Countrymen

Countrymen are those who look at GDP and see how much wealth one software bug has wiped out, and how we as software vendors and buyers have a personal responsibility for more than just code. 

We should be accountable to bugs, under reasonable regulation. The washing machine manufacturer is.
And yet… This kind of thing happens. It just does.

Am I happy with it? No.

Incident Response: CrowdStrike's Defining Measure

Would CrowdStrike be measured by how they respond to the incident, as opposed to just its impact? Absolutely - a lesson they know well as a company dealing with incident response crisis daily. The main lesson I had when I wrote the post-mortem for the first Internet war (Estonia, 2007).

 

Reflections on CrowdStrike

Facing Challenges: The Power of Collective Response

All I can do for now is stare at the attached picture below, and remember that FUD aside - when shizzle hits the fan, people get together and fix it. The sun will rise tomorrow, and business will go on.

Shifting Focus: Lessons for Buyers Beyond FUD

So, instead of FUD I suggest that we focus on what buyers can do differently to learn from the Crowdstike incident, regardless of whether the organization was hit by it or not.

Data Leakage Detection and Response for Enterprise AI Search

Learn how to assess and remediate LLM data exposure via Copilot, Glean and other AI Chatbots with Knostic.

Get Access

Mask group-Oct-30-2025-05-23-49-8537-PM

The Data Governance Gap in Enterprise AI

See why traditional controls fall short for LLMs, and learn how to build policies that keep AI compliant and secure.

Download the Whitepaper

data-governance

Rethinking Cyber Defense for the Age of AI

Learn how Sounil Yu’s Cyber Defense Matrix helps teams map new AI risks, controls, and readiness strategies for modern enterprises.

Get the Book

Cyber Defence Matrix - cover

Extend Microsoft Purview for AI Readiness

See how Knostic strengthens Purview by detecting overshared data, enforcing need-to-know access, and locking down AI-driven exposure.

Download the Brief

copilot-img

Build Trust and Security into Enterprise AI

Explore how Knostic aligns with Gartner’s AI TRiSM framework to manage trust, risk, and security across AI deployments.

Read the Brief

Image-1

Real Prompts. Real Risks. Real Lessons.

A creative look at real-world prompt interactions that reveal how sensitive data can slip through AI conversations.

Get the Novella

novella-book-icon

Stop AI Data Leaks Before They Spread

Learn how Knostic detects and remediates oversharing across copilots and search tools, protecting sensitive data in real time.

Download the Brief

Solution Brief

Accelerate Copilot Rollouts with Confidence

Equip your clients to adopt Copilot faster with Knostic's AI security layer, boosting trust, compliance, and ROI.

Get the One-Pager

cover 1

Reveal Oversharing Before It Becomes a Breach

See how Knostic detects sensitive data exposure across copilots and search, before compliance and privacy risks emerge.

View the One-Pager

cover 1

Unlock AI Productivity Without Losing Control

Learn how Knostic helps teams harness AI assistants while keeping sensitive and regulated data protected.

Download the Brief

safely-unlock-book-img

Balancing Innovation and Risk in AI Adoption

A research-driven overview of LLM use cases and the security, privacy, and governance gaps enterprises must address.

Read the Study

mockup

Secure Your AI Coding Environment

Discover how Kirin prevents unsafe extensions, misconfigured IDE servers, and risky agent behavior from disrupting your business.

Get the One-Pager

cover 1
bg-shape-download

See How to Secure and Enable AI in Your Enterprise

Knostic provides AI-native security and governance across copilots, agents, and enterprise data. Discover risks, enforce guardrails, and enable innovation without compromise.

195 1-min
background for career

What’s next?

Want to solve oversharing in your enterprise AI search? Let's talk.

Knostic offers the most comprehensively holistic and impartial solution for enterprise AI search.

protect icon

Knostic leads the unbiased need-to-know based access controls space, enabling enterprises to safely adopt AI.