NIST’s Cyber AI Workshop: Reflections and Integration with Privacy and AI Frameworks

NIST Cyber AI Profile Workshop

The National Institute of Standards and Technology (NIST) continues to play a pivotal role in shaping cybersecurity, privacy, and artificial intelligence (AI) risk management practices. Last quarter in April 2025, NIST hosted its First Cyber AI Profile Workshop, an event designed to gather community input on developing a Cyber AI Profile. This profile applies the […]

Privacy Challenges of Agentic AI: A Framework for Governance in the Age of Autonomous Systems

AI Regulations by state

Agentic artificial intelligence (AI) systems represent a paradigm shift in autonomy, decision-making, and inter-system coordination. Unlike traditional AI models, agentic AI operates across workflows, tools, and user contexts with minimal human input, creating a new frontier of privacy risks. Here is a multi-tiered framework for governing the privacy dimensions of agentic AI, focusing on design […]

Massive AI Dataset Breach: DataComp CommonPool Reveals Widespread Personal Data Exposure

Massive AI Dataset privacy breach

Researchers have uncovered a troubling amount of personal information lurking in one of the largest open-source datasets used to train AI models. The dataset, known as DataComp CommonPool, pulls together 12.8 billion image-text pairs scraped from the web between 2014 and 2022 through the nonprofit Common Crawl. Launched in 2023 for research but open to […]

Delta’s Shift to AI-Driven Personalized Pricing Creates Data Privacy Concerns Travelers

In a bold move that’s shaking up the airline industry, Delta Air Lines is accelerating its adoption of artificial intelligence to personalize ticket prices for individual customers. As announced by Delta’s president Glen Hauenstein during the company’s Investor Day, the airline aims to have 20% of its ticket prices determined by AI by the end […]

Generative AI Privacy Risks in Personal Use

A recent Israeli piece covered the generative AI privacy risks. Generative artificial intelligence (GenAI) tools are transforming how we create content, from drafting emails to generating artwork, understanding their privacy implications is crucial. Systems like ChatGPT, Gemini, Claude, DALL-E, and Midjourney allow users to produce text, images, videos, music, and code through simple prompts. While […]

Latin America and the Caribbean Navigate AI Governance

The U.S. Senate made a pivotal decision, voting 99-1 to strike down a proposed 10-year ban on state-level AI regulation from a federal reconciliation bill. This move underscores a broader global tug-of-war over how to govern artificial intelligence a debate that places Latin America and the Caribbean at a critical crossroads. Sandwiched between the U.S.’s […]

McDonald’s AI Hiring Bot Hacked with ‘123456’ Password, Exposing Millions of Job Seekers

McDonald’s AI Hiring Bot Breach: A Wake-Up Call for AI and Data Privacy

This month there was a “McBreach” on the McHire AI platform. While this was a shocking security breach for McDonald’s executives when the chatbot exposed the personal information of approximately 64 million job applicants worldwide. The breach occurred on the McHire platform, powered by an AI chatbot named Olivia, developed by Paradox.ai. Security researchers Ian […]

State AI Regulations Are Here to Stay

AI Regulations by state

The air in Washington felt electric last week, and now AI regulation is back on the states’ radar. Yesterday, the U.S. Senate voted 99-1 to scrap a proposed 10-year moratorium on state AI laws, a provision that had been tucked into the hefty “One Big Beautiful Bill Act.” For a while, it looked like Senators […]

MCP Security & Compliance Suite

The explosive growth of AI adoption across enterprises has created an unprecedented demand for specialized MCP (Model Context Protocol) security and compliance tools like the ones offered by Captain Compliance for enterprise clients. As organizations deploy AI assistants that can access databases, internal systems, and sensitive business applications through MCP connections, traditional security frameworks are […]