Bridgetown Research raises $19M from Lightspeed and Accel to deploy AI business research agents

Posted in Commentary with tags on February 26, 2025 by itnerd

Strategic business decisions have traditionally been expensive and slow for a fundamental reason: they don’t happen enough. This means companies lack both historical data to learn from and experts who have seen enough similar cases. Bridgetown Research is changing that. Today, the AI decision science startup announced $19 million in Series A funding led by Lightspeed and Accel, with participation from a leading research university.

Bridgetown Research has developed AI agents that autonomously execute research. Most notable amongst these agents are voice bots trained to recruit and interview industry experts, gathering primary data that can be analyzed alongside alternative data sourced from their partners. 

Founded by Harsh Sahai, who previously led machine learning teams at Amazon before leading strategy engagements at McKinsey & Co., Bridgetown Research was born from a simple observation: the majority of business analyses are a permutation of a small number of automatable tasks. The founding team, comprising former professionals from McKinsey, Bain, Amazon, and leading tech startups, brings together extensive experience across strategy consulting and technology.

While many AI solutions focus on searching and summarizing information using LLMs, real world business decisions require much more than synthesising the open web. They need proprietary data such as primary data from experts and customer surveys, along with frameworks to understand markets, what Harsh Sahai calls “ontologies”. Moreover, outputs need to be repeatable and auditable for a business to use them to make decisions with tens of millions of dollars at stake. Bridgetown Research is the only player using agents to gather primary data and systematically find patterns in it to generate original insights. 

Bridgetown Research started with a focus on private equity deal screening diligence. Multiple top-tier PE & VC firms already use Bridgetown Research for deal screening and deeper commercial diligence. They’re able to screen their pipeline much faster with initial analysis taking 24 hours instead of weeks without Bridgetown enabling teams to focus on actual decision making instead of research and analysis. For other customers Bridgetown has enabled voice of customer conversations that cover hundreds of respondents in parallel, and within days. 

As global markets become increasingly complex, the demand for efficient and effective decision-making tools continues to rise. With this funding round, Bridgetown Research plans to invest further in training its AI agents to perform a broader set of analyses across a broader range of domains, and deepening industry partnerships to enhance access to domain-specific intelligence.

The World Is Losing Its Mind Over The Bug Related To Trump On Apple Devices

Posted in Commentary with tags on February 26, 2025 by itnerd

Yesterday it came to light that there’s a bug on iOS devices where if you use the dictation function, and say the word “Trump” as in Donald Trump, it prints the word “Racist”. Now I did test this and I could reproduce this. But I could get other words to appear. But it really doesn’t matter at this point as the planet is hung up on the “Trump” and “Racist” connection. And all the usual nonsense that you would expect to happen is happening.

Scott Stephenson, Founder and CEO of Deepgram had this comment:

“AI is only as smart as the data it’s trained on. Voice recognition should be about understanding, not assuming. This is a reminder that companies need to constantly refine their models to avoid bizarre and potentially harmful mix-ups. The goal isn’t just accuracy, it’s trust.”

“Voice AI is exploding because, let’s face it, talking is faster than typing. But speed means nothing without precision. If AI can’t truly understand what we’re saying – accents, slang, emotions – then it’s just noise. The next wave of innovation is about making AI listen smarter, not just faster.”

On one hand, I am surprised that this wasn’t caught in QA. But on the other hand, I am not surprised because how far do you go to test a speech to text engine like this one? You can’t test every single word or name out there. Thus you can expect something like this to happen again. And chances are there’s nothing nefarious going on.

Guest Post: Is Cyber a Frog in the AI-Native Pot? 

Posted in Commentary with tags on February 26, 2025 by itnerd

By Tom Tovar, CEO of Appdome

Everyone knows the story of a frog placed in a pot of cold water. As the water heats up, the frog remains still until it’s too late. Today, the cyber function faces the same challenge as the frog, as the rest of the enterprise transitions to AI Native.

What is AI Native? 

“AI Native” refers to organizations, teams, or functions that fully integrate artificial intelligence into core operations. Rather than treating AI as an add-on, these entities leverage AI as a foundational element of their business, execution, delivery, and decision-making. They operate with AI at their core, embedding it into every process for speed, automation, improved efficiency, and to reduce dependencies on human capital, and other resources.

The Enterprise-Wide Shift Towards AI Native 

Across industries, enterprises are now shifting to an AI-Native approach. In 2025, key parts of the enterprise are moving beyond experimentation to complete restructuring. Departments, workflows, decision-making, and strategic planning are being reshaped around AI-driven automation and analysis for productivity. Key areas include:

  1. Software Development and Engineering: AI-powered coding assistants accelerate development, improve software quality, and streamline DevOps with automated testing and CI/CD processes. 
  2. Marketing: AI-driven platforms analyze consumer behavior, enabling hyper-personalized campaigns and optimized ad spend. 
  3. Customer Support & Experience: AI chatbots can handle customer service at scale, reducing dependence on humans.
  4. Fraud & Risk Management: AI enhances for fraud detection and risk modeling, quickly identifying anomalies and mitigating financial risks.
  5. Supply Chain and Logistics: AI predictive analytics optimize inventory while automating procurement and delivery. 
  6. HR and Talent Management: AI streamlines recruitment, identifies top talent faster, and enhances workforce management.

The goal is clear: faster decision-making, increased efficiency, and minimized human error while maximizing value. 

Cybersecurity Must Adapt…or Get Boiled Alive

Currently, cybersecurity teams focus on addressing the risks of AI adoption rather than embedding AI into their own cyber operations. This misalignment threatens their role as enterprises adopt AI-Native models at an accelerated pace. Without becoming AI-Native, the water will get too hot too fast. Cyber teams are falling behind as AI-Native organizations accelerate.  

Why Cybersecurity Must Go AI-Native Now

Cybersecurity must go beyond AI-enhanced tools. Here are the top 5 reasons why the cyber teams need to go AI-Native:

  1. AI-Driven Threats Require AI-Driven Defense

Cybercriminals leapt into the AI boom to create highly sophisticated attacks, from deepfake-powered facial recognition bypasses to large-scale social engineering attacks at scale and autonomous malware evading detection. To counter these threats, organizations need an AI-Native defense that adapts, responds, and mitigates attacks in real time..

  • Maintain Control of the Defense Lifecycle 

An AI-Native approach automates the entire defense lifecycle, including defense delivery, compliance, threat identification, and incident response, as well as guiding end users through resolving an attack. Gone are the days when the cyber function and the security operation center (SOC) could rely on AI for threat detection, but still depend on manual processes to resolve threats. With AI-Native cybersecurity, teams can control automatically every aspect of defense, eliminating delays caused by dependencies on multiple departments and manual actions. 

  • Improve Decision-Making & Incident Response

Security leaders rely on multiple data sources, logs, and reports. AI-driven analytics provide deep insights and early warnings on emerging threats, along with benchmark comparisons and dynamic risk analysis. An AI-Native approach accelerates decision-making in incident response, automating defenses in real time before escalation.

  • Eliminate Dependence on Other Departments

Many security teams are constrained by IT, engineering, and operations for critical tasks like threat modeling, infrastructure changes, and security tool integrations. With AI-Native defense, the cyber function can automate defense delivery independently of external teams. Now security teams can automate defense enforcement, reducing delays while accelerating security measures. 

  • Guarantee Business Protection and Revenue Security

As AI drives efficiency across enterprise functions, cybersecurity teams must keep up with rapid innovation. New applications, capabilities, revenue sources, threats, and vulnerabilities are evolving faster than ever. AI-Native security delivers continuous fraud prevention, automated security updates, and preemptive threat mitigation. With AI-Native, cyber and fraud defenses can be deployed instantly and ensure continuous defense.

Cyber’s Top Priority for 2025: Become AI Native.  

Looking forward, CISOs and cybersecurity teams can no longer afford to see AI merely as a tool but must embrace AI as their foundation. Just as other enterprise functions use AI for speed, efficiency, and agility, cybersecurity must do the same – eliminating manual tasks, handoffs and learning curves.

With AI-Native, cyber teams use technology platforms to automate the entire defense lifecycle, ensuring readiness, reducing bottlenecks, and ensuring that security, ant-fraud and bot defense are delivered continuously. The future of cybersecurity isn’t just AI-aided — it’s AI-Native. Don’t be the cyber frog in the pot. The time to act is now.

Microsoft 365 Targeted by Massive Botnet in Password Spraying Attacks

Posted in Commentary with tags on February 26, 2025 by itnerd

Researchers have discovered botnet of over 130,000 compromised devices that is launching password spraying attacks against Microsoft 365 accounts. Most if not all of which are service accounts. Details can be found here:

https://securityscorecard.com/research/massive-botnet-targets-m365-with-stealthy-password-spraying-attacks/

Darren James, Senior Product Manager at Specops Software, commented:

“This is certainly an interesting and often overlooked attack vector, password spraying of service accounts rather than users.

Service Accounts are regularly used to run business critical systems, their passwords are rarely changed, don’t have any type of 2FA applied and they usually have some elevated privilege depending on their function. Meaning they are a good target for attack.

We often see service accounts on our breached password and duplicate password reports when customers run our free tool Specops Password Auditor. These passwords are usually set by the IT admin who is installing the service and then never changed again, and it’s fairly common that the passwords set on these accounts aren’t strong or may have been used on other accounts in the past.

When we are discussing the results of the report, admins are always worried about making changes to service accounts as that might cause disruption to a business critical solution, but as this latest attack highlights, that approach does leave companies at risk.

Businesses should look to enforce very strong and long passwords on service accounts wherever possible, scan these accounts continuously for breached passwords, enforce the use of password vaults and randomly generated passwords for these types of accounts, or if possible, move to using a managed service account that allows the system to set, and regularly change, the passwords of service accounts without human intervention.”

Now would be a good time to change any Microsoft 365 service accounts passwords. Because the only reason why this attack is out there, is because it is likely meeting with some amount of success.

CHIPS Act At Risk Because Of DOGE

Posted in Commentary with tags , on February 26, 2025 by itnerd

The CHIPS Act (Creating Helpful Incentives to Produce Semiconductors Act) is likely to be severely impacted by DOGE, notes the author of this post CHIPS Act dies because employees are fired – NIST CHIPS people are probationary on SemiWiki, an open forum for semiconductor professionals.

The CHIPS Act was passed to advance US silicon supply chain security, R&D and stability. The post cites informed sources as reporting that the National Institute of Standards and Technology (NIST) is preparing to cut 497 people, including 74 postdocs, 57% of CHIPS staff focused on incentives, and 67% of CHIPS staff focused on R&D. The post also notes that President Trump has also not yet announced a nominee to head up NIST.

Willy Leichter, CMO, AppSOC, offers perspective:

  “As the Trump administration continues to indiscriminately hack its way through federal agencies, the latest victim appears to be NIST, reportedly losing at least 500 staff. Using the logic of “last in, first out,” DOGE is ignoring the merits of employee roles or projects, and simply terminating anyone they can easily dump. The other mandate seems to be to kill any initiative of the Biden administration, regardless the context or value. On the chopping block are the new AI Safety Institute, tasked with ensuring safety of AI models and systems, and the Chips for America program intended to protect sensitive chips technology from foreign (largely Chinese) theft. This comes on top of dismantling public/provide collaboration with the Cyber Safety Review Boards.

  “NIST provides a critical backbone for all cybersecurity with essential resources such as the National Vulnerability Database. The agency is small by federal standards with only 3,400 employees. Cutting 500 jobs is about 15% of the total workforce – an enormous cut, at a time when cyber risks are accelerating and direct attacks on U.S. critical infrastructure and government systems have never been higher. AI is also a massive security wild card, and destroying important government safety checks could be devastating. The net effect will be to demoralize a critical and highly respected agency, embolden our adversaries to ratchet up their attacks, and put all of us at a direct financial and security risk.”

This is another short sighted and frankly stupid move by Trump and Elon Musk that will only result in the USA being hurt in the process. You have to wonder when these two will figure that out. I’m guessing that they will only when it’s way too late.

DISA Global Solutions Gets Pwned…. 3+ Million Affected

Posted in Commentary with tags on February 26, 2025 by itnerd

DISA Global Solutions, a provider of workplace compliance management and employee screening solutions, reported that it suffered a data breach that affects more than 3.3 million people. They have posted a data breach notification here as well.

Jim Routh, Chief Trust Officer at cybersecurity company Saviynt had this comment:

“Two dimensions of this cyber incident are notable. The first is that SSNs were exfiltrated for individuals and these are easily monetized by threat actors. Storing SSNs for any purpose should require a higher level of security and using SSN to identify digital consumers is an obsolete data management practice. 

“The second dimension is the root cause of the breach is not provided so it is not clear what steps DISA took to reduce the probability of this happening again. Cyber incidents occur in all enterprises so missing an opportunity to make adjustments to controls and processes based on the learnings applied from previous breaches is an indication of cyber resilience and a positive indicator. In this case, there is no indication of cyber resilience.” 

Javvad Malik, Lead Security Awareness Advocate at KnowBe4, adds this:

“This incident not only highlights the sophistication of cyber adversaries but also exposes the vulnerabilities in the cyber defenses of an establishment that prides itself on efficiency and compliance. It’s a sector that is inherently trusted with some of the most private aspects of individuals’ lives, from social security numbers to medical history. The fact that DISA, with its expansive list of high-profile clients including a significant portion of the Fortune 500 companies, fell victim to such an exploit illustrates a concerning underestimation of the capabilities of modern cyber threats.”

“Moreover, the delay in detecting and reporting the breach raises pressing questions about the ongoing monitoring and incident response strategies employed by DISA. Regulatory implications aside, the slow acknowledgment and mitigation could erode the very trust DISA seeks to build with its partners and the individuals it screens.”

“Providing identity theft protection services post-breach, while necessary, is merely a reactive measure. It is imperative for organizations, especially those like DISA that handle vast amounts of personal data, to adopt a more proactive stance on cybersecurity. This includes continuous monitoring, employing advanced threat detection technologies, and fostering a culture of security awareness throughout the organisation.”

“As the investigation unfolds, it will be crucial for DISA and its stakeholders to thoroughly understand how the attackers circumvented their defences and to implement robust measures to prevent future incidents.”

The hacks and leaking of personal information never seem to be ending. You have to wonder when companies will learn that they need to invest the time, effort and money to not be one of my stories about a company getting pwned.

Clicks brings its award-winning iPhone keyboard case to Google, Motorola and Samsung smartphones

Posted in Commentary with tags on February 26, 2025 by itnerd

Clicks Technology today announced the first three Clicks Keyboards for Android smartphones. Building on the popularity of Clicks for iPhone introduced last year, Clicks extends a premium typing experience, more screen real estate and keyboard shortcuts to owners of Google Pixel, Motorola Razr and Samsung Galaxy smartphones. Available for pre-order today, Clicks for Android smartphones will start shipping beginning in April.

Clicks supercharges the Samsung Galaxy with a premium typing experience engineered for speed and accuracy. Maximize every bit of the S25’s 6.2” display by moving the virtual keyboard off screen. Put Samsung AI at your fingertips with keyboard shortcuts. Compatible with Samsung Galaxy S25. Available in two colors: Pinot (red) and Onyx (black).

Expanding the audience for Clicks

With over 100,000 keyboards sold in more than 100 countries, Clicks is changing the way people use their smartphones.

Adding a Clicks Keyboard to a Pixel, Razr or Galaxy smartphone combines the benefits of buttons with the power of Android in a seamless experience.

  • Premium Typing Experience. Type with speed and confidence with ergonomically designed keys that provide satisfying tactile feedback.
  • 50% More Screen. By moving the keyboard off the display Clicks frees up screen space for apps and content.
  • Keyboard Shortcuts. Launch your favourite apps and navigate Android.
  • Gemini Key. Launch AI features at the push of a button.
  • Keyboard Backlight. Backlit keys make typing in low light a breeze.
  • Clicks App. Customize and personalize your typing experience.
  • Charge Your Phone as Normal. Clicks connects through USB-C so there’s no battery to charge or bluetooth connection to pair.
  • Easy on and off. Add a compact, lightweight keyboard when needed, or leave it on all the time.
  • Protection & personality. Clicks protects your phone and grabs attention wherever you go.

Launch Pricing and Availability

  • Google Pixel 9 and Pixel 9 Pro: Pre-orders begin February 25 at an introductory price of USD $99, available until March 21. After this date, the price increases to USD $139. Orders will begin shipping at the end of April.
  • Motorola Razr+ and Razr (2024): Reservations open February 25 for USD $49 to secure a special launch price of USD $99 until March 21. After March 21, pre-orders remain available for USD $49, but the final price increases to USD $139. Shipping starts in late May.
  • Samsung Galaxy S25: Reservations open starting February 25 for USD $49 to lock in a limited-time USD $99 launch price until March 21. After this period, pre-orders remain open for USD $49, with the final price increasing to USD $139. Shipping begins in June.

Order Clicks for Android exclusively at Clicks.tech

New KnowBe4 Report Reveals the Hidden Power of Information Sharing in Shaping an Organization’s Security Culture

Posted in Commentary with tags on February 26, 2025 by itnerd

KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today announced the release of research report “Cybersecurity Information Sharing as an Element of Sustainable Security Culture”, authored by Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4, and Dr. William Seymour, Lecturer in Cybersecurity at King’s College London. The report examines how people consume and share cybersecurity information, revealing the role that workplace training plays in fostering information sharing among colleagues.

Many employees already engage with cyber-related information in their personal lives, and when they proactively share it, it reflects a mature security mindset. A well-established security culture encourages good habits, mutual support, and a clear awareness of risks. By examining how cybersecurity news spreads, organizations can gain valuable insights to strengthen defenses and minimize human risk.

The report found that, on average, 57% of people surveyed received cybersecurity-related training, with 73% in the UK, 60% in the U.S., 55% in Germany and only 38% in France. Workplace training influenced information sharing, as 24% of those trained went on to share insights with colleagues and were more likely to remember phishing-related content.

Other key findings: 

  • 95% of people have read or watched cybersecurity content at least once. 
  • 77% have had cybersecurity information shared with them and 25% have actively shared cybersecurity information with others. 
  • 22% of employees find cybersecurity information from websites and 21% find it from employers. 
  • Generally, employers were an important source of cybersecurity information across all age groups, whereas social media was an important channel for the 18-29 year age group. 

Ultimately, ‘the more you care, the more you (want to) share’. When employees are properly engaged with cyber risks, the more likely they are to openly communicate with others about this topic and create a stronger security culture in the workplace. Understanding how employees consume and share cybersecurity news is essential for building a stronger security culture.

The full report, “Cybersecurity Information Sharing as an Element of Sustainable Security Culture”, is available to download here.

Appdome Preempts DeepSeek Attacks on Mobile Devices

Posted in Commentary with tags on February 26, 2025 by itnerd

Appdome has announced that new dynamic defense plugins are available on its AI-Native Defense platform to detect and defend against DeepSeek AI attacks on Android & iOS devices. The new plugins allow enterprises to safeguard mobile enterprise apps, harden remote access and protect mobile work from DeepSeek spyware. 

The new plugins use behavioral analytics to detect unusual file access, data extraction, user monitoring, and unusual network traffic to external AI servers performed by DeepSeek. Like all Appdome defenses, the new dynamic defense plugins targeting DeepSeek attacks are available by choice using the Appdome platform without the need to integrate code, perform manual coding, implement SDKs, or deploy servers.

DeepSeek, a free, AI-powered chatbot mobile app, has grown in popularity quickly. It has also created a huge risk for enterprises and governments using mobile devices and apps in the workforce. For example, reports have surfaced that DeepSeek can be used as spyware to harvest and send user data to China without the user’s knowledge. Likewise, users can unknowingly or accidentally post sensitive information to DeepSeek, creating data leakage risks for corporate data and sensitive documents. 

Recognizing the severity of the threat posed by DeepSeek, some enterprises have banned the use of DeepSeek for work purposes. Likewise, several government agencies, including in the United States and South Korea have introduced legislation to ban the use of DeepSeek on mobile devices used for government purposes. However, these bans are without teeth because – without Appdome – there is no way to detect DeepSeek on a mobile device, particularly a BYOD mobile device in an enterprise setting. And there’s no way to detect if DeepSeek is being used as spyware or if users share sensitive data via DeepSeek.

Appdome’s new Detect DeepSeek Attack plugins are particularly powerful in enterprise use cases such as mobile apps for work, enterprise apps, and Bring Your Own Device (BYOD) mobile strategies. When deployed in an enterprise app, the defense will detect an active DeepSeek session on the device and offer enterprises and B2B mobile app makers multiple enforcement options to mitigate the DeepSeek risk. Appdome’s new DeepSeek detection can be deployed stand alone or in combination with other defenses to detect DeepSeek being used as spyware and when employees post content to DeepSeek.

In published cases, DeepSeek exposed users to unauthorized data collection, weak encryption practices, and potential surveillance by state-linked entities. Security analyses reveal that DeepSeek transmits user data without proper encryption, employs outdated cryptographic algorithms, and lacks robust anti-tampering protections, making it vulnerable to reverse engineering. Beyond these published risks, attackers can expedite the runtime analysis of potential victim apps by feeding DeepSeek with memory dumps, encrypted files, and server responses directly on the device. This could also enable runtime memory extraction, allowing attackers to scan active memory for cryptographic keys, authentication tokens, and decrypted session data, compromising financial transactions and authentication flows. 

Additionally, DeepSeek may facilitate dynamic code injection by identifying unprotected vectors, enabling attackers to bypass security controls like root detection and anti-debugging, manipulate app behavior, and intercept sensitive interactions without persistent malware. The creators of DeepSeek have set guardrails designed to prevent using the AI model for malicious purposes, however, during the analysis of this model multiple “jailbreaks” were found that allow circumventing security restrictions. 

Learn more about Appdome AI-Native defense for DeepSeek AI threats.

Promise Robotics expands Homebuilding Factory-a-Service with a new factory in Calgary, Alberta

Posted in Commentary with tags on February 25, 2025 by itnerd

Promise Robotics, an AI company turning off-the-shelf industrial robots into autonomous production systems for home construction, announced its plans to expand deployment of its production lines at a new 60,000-square-foot existing warehouse located in Calgary, Alberta, Canada. To begin operation in the summer of 2025, the facility will be able to produce up to 1,000,000 square feet of housing annually. The expansion represents the latest advancements in automation and robotics in the homebuilding industry, harnessing Promise Robotics’ AI brain and robotic tooling to address housing shortages in Canada and the United States. 

Promise Robotics is transforming how homes are built in a traditional industry that hasn’t seen disruptive innovation for decades and is experiencing a massive lag in productivity at a time when we need to produce more homes to meet the demand. Built by builders for builders, the company is enabling the homebuilding industry with its “Homebuilding Factory-as-a-Service (FaaS)” platform to boost production capacity and deliver homes faster with significantly fewer resources.  

The new state-of-the-art robotic system in Calgary builds on the success of Promise Robotics’ Factory-as-a-Service facility in Edmonton and is creating more opportunities for the industry to build homes faster and more efficiently. Through automation and robotics, home builders can integrate fragmented processes and transform their blueprints into production-ready designs with AI-powered robots that produce homes from single-family to multi-story apartments. Along with making the process more efficient, homes are built locally – using local materials, localized supply chains, and local labour- to ensure communities are supported at the point of construction, including the added benefit of solving for the skilled labour shortages across North America.  

Promise Robotics’ production systems can be rapidly deployed at an existing warehouse or temporary structure offsite or onsite to provide builders with a one-stop production solution from blueprint to assembly. On top of rapid deployment, Promise Robotics’ proprietary solution can be easily redeployed to support rapid home production and fluctuating demand, maximizing housing supply across developing communities no matter the type of build. Promise Robotics manages the entire automation lifecycle within factories as a service, freeing customers to focus on homebuilding and growing the business — something that hasn’t been available before. With this announcement comes Promise Robotics’ continued investment in Alberta.

Promise Robotics’ production systems can be rapidly deployed at an existing warehouse or temporary structure offsite or onsite to provide builders with a one-stop production solution from blueprint to assembly. On top of rapid deployment, Promise Robotics’ proprietary solution can be easily redeployed to support rapid home production and fluctuating demand, maximizing housing supply across developing communities no matter the type of build. Promise Robotics manages the entire automation lifecycle within their factories as a service, freeing customers to focus on homebuilding and growing the business — something that hasn’t been available before. 

Through robotics and automation, Promise Robotics gives Canada’s homebuilding industry the opportunity to be leaders in addressing the global housing shortage, while unlocking new opportunities for job creation and upskilling a new generation of talent. The new Calgary facility will officially start production in Summer 2025.