Skip to main content

Knostic Resource Library

Resouces-bg

Knostic
Resource Library

cover 1

Request a Demo

Is your enterprise ready yet to deploy AI? Request a demo to see how Knostic governs sensitive data and prevents leaks across copilots, agents, and generative AI tools.

Solution Brief: LLM Data Leakage

LLM Data Leakage Detection and Response for Enterprise AI Chatbots.

LLM Flowbreaking

AI Security Research: LLM Flowbreaking

New AI Attack Causes LLM to Provide Potential “Self-Harm” Instructions.

Glossary of AI Terms

New AI Attack Causes LLM to Provide Potential “Self-Harm” Instructions.

Download the Cyber Defense Matrix ebook

The Essential Guide to Navigating the Cybersecurity Landscape
Cyber Defence Matrix - cover

Amazon logo

Physical copies also available for purchase
on Amazon.

Amazon-star-rating4.6 (85 reviews)

Sounil Yu
by Sounil Yu
Knostic CTO

Download the ebook

Data Governance in the Age of LLMs

The Hidden Risks of AI

copilot-img

Copilot Oversharing Risks: Knostic and Purview

Stop Copilot Data Oversharing with Knostic & Purview

Knostic in AI TRiSM

Knostic in AI Trust, Risk, Security Management (TRiSM)

LLM Jailbreak Prompts by Industry: A Hands-On Playbook

Knostic in AI Trust, Risk, Security Management (TRiSM)

Safely Unlock Hidden Copilot Knowledge in Microsoft 365

Why Copilot’s Hidden Knowledge Creates New Security Risks

Secure Your Microsoft 365 Environment for the Age of AI

See how Knostic helps E3 and E5 customers strengthen Microsoft 365 security

Unlock Copilot on E3 with Confidence

Get practical guidance for deploying Copilot quickly and securely.

Latest research and news

Coding agents, assistants, and MCP security

The Hidden Danger of Shadow AI Coding Tools

 
Fast Facts on Shadow AI Coding Shadow AI refers to unsanctioned or unapproved AI tools used in development workflows without enterprise visibility or governance. Developers ...
Coding agents, assistants, and MCP security

Context Window Poisoning in AI Coding Assistants

 
What This Post on Context Window Poisoning Covers Context window poisoning is a stealthy attack in which malicious text is hidden in code comments, metadata, or documentation that ...

Schedule a demo to see what Knostic can do for you