Portend AI
@portendai.bsky.social
Portend AI’s risk management platform covers cybersecurity, availability, reputation, compliance & third party risk
Products:
Business Risk Management: Risk insights for your business
Portfolio Risk Intelligence: Risk analysis for your portfolio companies
Products:
Business Risk Management: Risk insights for your business
Portfolio Risk Intelligence: Risk analysis for your portfolio companies
Fantastic insights from Chris Mattmann! His thoughts on AI ethics, digital moderation, and deepfake detection hit the markreminding us that cybersecurity isn’t just about tools, it’s about thoughtful, responsible digital behavior.
October 16, 2025 at 5:06 PM
Fantastic insights from Chris Mattmann! His thoughts on AI ethics, digital moderation, and deepfake detection hit the markreminding us that cybersecurity isn’t just about tools, it’s about thoughtful, responsible digital behavior.
Impressive work uncovering the limits of traditional anti-phishing training. This study proves what many security teams have suspected — awareness alone isn’t enough. Time to double down on phishing-resistant MFA, password managers, and smarter automation.
October 16, 2025 at 5:04 PM
Impressive work uncovering the limits of traditional anti-phishing training. This study proves what many security teams have suspected — awareness alone isn’t enough. Time to double down on phishing-resistant MFA, password managers, and smarter automation.
A remarkably comprehensive and data-driven forecast. This report captures the evolving nature of cyber threats with precision—highlighting how identity compromise and human-centric attacks are redefining perimeter defense. A must-read for CISOs and security leaders preparing for Q4.
October 16, 2025 at 4:59 PM
A remarkably comprehensive and data-driven forecast. This report captures the evolving nature of cyber threats with precision—highlighting how identity compromise and human-centric attacks are redefining perimeter defense. A must-read for CISOs and security leaders preparing for Q4.
Excellent breakdown of how HIPAA and HITECH shape the health tech landscape. This guidance highlights not just compliance essentials, but the strategic advantage of embedding security and privacy from the start. A must-read for every health tech founder.
October 16, 2025 at 4:57 PM
Excellent breakdown of how HIPAA and HITECH shape the health tech landscape. This guidance highlights not just compliance essentials, but the strategic advantage of embedding security and privacy from the start. A must-read for every health tech founder.
Brilliantly articulated piece, Bryan. The “data as uranium” analogy perfectly captures the gravity of AI’s privacy dilemma. A must-read for every security and data leader navigating the balance between innovation and protection.
October 14, 2025 at 1:32 PM
Brilliantly articulated piece, Bryan. The “data as uranium” analogy perfectly captures the gravity of AI’s privacy dilemma. A must-read for every security and data leader navigating the balance between innovation and protection.
A powerful and eye-opening read by Malwarebytes Labs. The data on how AI is amplifying extortion and deepfake scams among Gen Z is both alarming and necessary to understand. Awareness like this helps us strengthen digital resilience and protect what matters most—our privacy and peace of mind
October 14, 2025 at 1:19 PM
A powerful and eye-opening read by Malwarebytes Labs. The data on how AI is amplifying extortion and deepfake scams among Gen Z is both alarming and necessary to understand. Awareness like this helps us strengthen digital resilience and protect what matters most—our privacy and peace of mind
A must-read for security professionals preparing for the rise of AI-assisted cybercrime.
September 16, 2025 at 2:53 PM
A must-read for security professionals preparing for the rise of AI-assisted cybercrime.
A clear breakdown of how Remote Access Trojans operate and why they’re one of the most dangerous forms of malware.
September 16, 2025 at 2:51 PM
A clear breakdown of how Remote Access Trojans operate and why they’re one of the most dangerous forms of malware.
A must-watch to understand how AI is accelerating both innovation and risk in cybersecurity.
September 16, 2025 at 2:49 PM
A must-watch to understand how AI is accelerating both innovation and risk in cybersecurity.
Great breakdown of how security was bolted onto the Internet after its creation, and the challenges that caused.
September 16, 2025 at 2:48 PM
Great breakdown of how security was bolted onto the Internet after its creation, and the challenges that caused.
AI-generated art isn’t just creative expression anymore it’s a new battlefield for cyber influence and disinformation.
September 16, 2025 at 2:47 PM
AI-generated art isn’t just creative expression anymore it’s a new battlefield for cyber influence and disinformation.
A great reminder that hacking is both a social and technical phenomenon shaping our digital future.
September 16, 2025 at 2:46 PM
A great reminder that hacking is both a social and technical phenomenon shaping our digital future.
Important spotlight on how misusing legal tools like DMCA can backfire transparency and responsible disclosure are the bedrock of cybersecurity.
September 16, 2025 at 2:41 PM
Important spotlight on how misusing legal tools like DMCA can backfire transparency and responsible disclosure are the bedrock of cybersecurity.
A very powerful reminder that the true impact of cyberattacks goes beyond financial losses the psychological toll on employees is often overlooked.
September 16, 2025 at 2:36 PM
A very powerful reminder that the true impact of cyberattacks goes beyond financial losses the psychological toll on employees is often overlooked.
Really valuable overview of the major policy fronts shaping AI from workforce readiness to geopolitics.
September 16, 2025 at 2:35 PM
Really valuable overview of the major policy fronts shaping AI from workforce readiness to geopolitics.
Excellent deep dive into a very under-discussed risk indirect prompt injections and backdoor insertions are a real wake-up call for developers.
September 16, 2025 at 2:32 PM
Excellent deep dive into a very under-discussed risk indirect prompt injections and backdoor insertions are a real wake-up call for developers.
Really insightful coverage it captures both the hype and the grounded reality of AI’s role in cybersecurity.
September 16, 2025 at 2:17 PM
Really insightful coverage it captures both the hype and the grounded reality of AI’s role in cybersecurity.
Excellent breakdown of how red teaming drives real resilience, thanks for sharing
September 9, 2025 at 3:49 PM
Excellent breakdown of how red teaming drives real resilience, thanks for sharing
Really enjoyed this breakdown great mix of pop culture and cyber reality.
September 9, 2025 at 3:47 PM
Really enjoyed this breakdown great mix of pop culture and cyber reality.
Solid compilation perfect for anyone leveling up in intelligence work.
September 9, 2025 at 3:45 PM
Solid compilation perfect for anyone leveling up in intelligence work.
Really appreciate how this makes a serious threat easy to understand.
September 9, 2025 at 3:43 PM
Really appreciate how this makes a serious threat easy to understand.
Excellent overview of the top cybersecurity skills for 2025 clear and practical.
September 9, 2025 at 3:41 PM
Excellent overview of the top cybersecurity skills for 2025 clear and practical.