Skip to main content
Blog
William Blondel
FR
Open search
Toggle theme
Open menu
Blog
William Blondel
The Offensive AI Landscape
AI-Driven Defense Architectures
Secure Coding in the Age of AI
More
AI Governance, Ethics, and Future Trends
Open search
FR
Toggle theme
Close
The Offensive AI Landscape
AI-Driven Defense Architectures
Secure Coding in the Age of AI
AI Governance, Ethics, and Future Trends
Archive
— William Blondel Blog
55 posts published so far
Mar 7, 2026
The "Splinternet": How Geopolitical AI Regulations Fragment the Web
Feb 28, 2026
Green IT & Security: The Energy Cost of Training Defensive Models
Feb 21, 2026
The Skills Gap: Will AI Replace the Junior Cybersecurity Analyst?
Feb 14, 2026
Ethical Hacking with AI: Red Teaming with Automated Tools
Feb 7, 2026
Insider Threat Detection: Identifying Disgruntled Employees via Behavior
Jan 31, 2026
IoT Security: Protecting Smart Devices with Lightweight Models
Jan 24, 2026
Cloud Security Posture Management (CSPM): AI for Config Monitoring
Jan 17, 2026
Quantum Computing: The Threat to Current Encryption
Jan 10, 2026
Data Sovereignty: Private LLMs vs. Public Cloud APIs
Jan 3, 2026
NIST AI Risk Management Framework: A Guide for Organizations
Dec 27, 2025
Copyright & Code: Who Owns AI-Generated Software?
Dec 20, 2025
GDPR & LLMs: The 'Right to Be Forgotten' in a Neural Network
Dec 13, 2025
The EU AI Act: Compliance Requirements for High-Risk Systems
Dec 6, 2025
Technical Debt: How AI-Generated Code Impacts Maintainability
Nov 29, 2025
Mobile App Security: AI Threats to iOS and Android
Nov 22, 2025
Container Security: Anomaly Detection in Kubernetes
Nov 15, 2025
Software Bill of Materials (SBOM): Tracking AI Components
Nov 8, 2025
The Risk of "Hallucinated" Vulnerabilities: False Positives in Audits
Nov 1, 2025
Web Application Firewalls (WAF): Adapting to New Injection Vectors
Oct 25, 2025
Bot Management: Distinguishing Human Users from AI Scrapers
Oct 18, 2025
Secrets Management: Preventing AI from Hardcoding Keys
Oct 11, 2025
API Security: Detecting Anomaly Usage Patterns in Microservices
Oct 4, 2025
Fuzzing at Scale: Using AI to Generate Edge-Case Test Inputs
Sep 27, 2025
Secure Coding with Copilot: Best Practices for AI-Assisted Dev
Sep 20, 2025
SAST vs. DAST: Enhancing Code Scanning with Machine Learning
Sep 13, 2025
Shadow AI: The Silent Threat to Your Software Supply Chain
Sep 5, 2025
Governance of AI Defense: Ensuring Your Defensive AI Isn't Biased
Aug 29, 2025
XDR and AI Threat Hunting: Unifying the Security Stack
Aug 22, 2025
The Future of Firewalls: Next-Gen Firewalls (NGFW) with Deep Learning
Aug 15, 2025
Network Traffic Analysis (NTA): Detecting Encrypted Malicious Traffic
Aug 8, 2025
EDR and the Role of ML Agents: Securing the Endpoint
Aug 1, 2025
Email Security Gateways: NLP for Detecting Semantic Phishing
Jul 25, 2025
Deception Technology: Using AI to Generate Dynamic Honeypots
Jul 18, 2025
Self-Healing Networks: AI-Driven Patch Management
Jul 11, 2025
Biometric Liveness Detection: Countering Deepfakes
Jul 4, 2025
Zero Trust Architecture in the Age of AI: Continuous Verification
Jun 27, 2025
Predictive Threat Intelligence: Forecasting Attacks Before They Happen
Jun 20, 2025
Automated Incident Response (SOAR): Defending at Machine Speed
Jun 13, 2025
AI-Powered SIEM: Reducing Alert Fatigue for SOC Analysts
Jun 6, 2025
UEBA: Moving Beyond Signatures with AI-Driven Behavioral Analytics
May 30, 2025
Adversarial Examples: Fooling Image Recognition Systems
May 23, 2025
Data Poisoning: Sabotaging AI Training Datasets
May 16, 2025
Model Stealing & Extraction: Reverse-Engineering AI
May 9, 2025
AI in OSINT: Automating the gathering of target intelligence
May 2, 2025
CAPTCHA breaking: How vision models render "I am not a robot" obsolete
Apr 25, 2025
AI-driven password cracking: The end of "complex" 8-character passwords
Apr 18, 2025
Jailbreaking LLMs: The "DAN" (Do Anything Now) Phenomenon
Apr 11, 2025
Prompt injection attacks: Hacking the logic of chatbots
Apr 4, 2025
Deepfake Video in KYC: Bypassing Biometric Verification
Mar 28, 2025
Voice cloning & vishing: the new frontier of CEO fraud
Mar 21, 2025
The Chameleon Code: AI-Driven Polymorphic Malware
Mar 14, 2025
Automated Spear Phishing: How LLMs Scale Social Engineering
Mar 7, 2025
AI Weaponization: The Industrialization of Cyber Threats
Feb 10, 2024
A URL shortener service using only the Caddy server
Jan 25, 2024
Welcome to the world of machines and humans!