Jo Peterson
@cleartechtoday
Engineer who helps clients scope, source and vet solutions in #Cloud, #CloudSecurity, #AIsecurity #Cybersecurity |Tech Analyst| USAF Vet|
📌 ClearTech Loop Episode 4 is live! AI, Trust, and Growth: What CIOs Must Get Right In Episode 4 of The CISO Slant, I talk with Mike Britton, CIO at Abnormal Security about how security and privacy leaders can keep pace with innovation. As companies race to implement AI…

📌 Q: How is #AgenticAI different than generative AI? A: Agentic AI focuses on autonomous decision-making and action to achieve specific goals, essentially acting as an agent to carry out tasks independently. In contrast, generative AI excels at creating new content, such as…
📌 The clock ⏰ is ticking! We're 2 weeks away from hashtag #BlackHat I'll be there in Vegas on site. Tech Marketing and Social teams, I can support in the following activations live from the Expo Floor 🗝️ Executive interviews 🗝️ Man-on-the-street interviews 🗝️ Booth walk…

📌 Q: In the case of MCP servers, what benefits does containerization offer? A: Containerization offers 4 main benefits: 🤖 Isolation: Each MCP server instance (or component of a larger MCP system) can be run within its own container, isolating it from other applications on…
📌 Q: Why is output sanitization integral to Model Context Protocol (MCP) servers? A: Output sanitization in the context of Model Context Protocol (MCP) servers refers to the process of meticulously cleaning and validating the data returned by an MCP server to an Artificial…
📌 OT Meets IT: Risk, Culture, and the Industrial Security Playbook In Episode 3 of The CISO Slant, I speak with Thomas LaBonte, CISO at Saint-Gobain North America, about the complex realities of securing manufacturing environments. From integrating cybersecurity with…

📌 Q: What is Code Attack Prevention in agentic ai? A: In agentic AI, "Code Attack Prevention" refers to the strategies and techniques used to defend against malicious code injection and execution attempts, particularly those that exploit the autonomous and self-improving…
📌 Q: In the context of securing Model Context Protocol Servers, what is a “Confused Deputy” problem? A: In the context of securing Model Context Protocol (MCP) servers, the "confused deputy" problem refers to a security vulnerability where the MCP server, acting as an…
📌 Q: Why is explicit, scoped authorization for Model Context Protocol (MCP) servers important? A: By granting the AI the minimal necessary permissions needed for its task, organizations can limit potential damage if the system is compromised or exploited through prompt…
📌 Shut the front door! ClearTech Loop, my new podcast, has just over 2000 subscribers in a week! I realize that number isn't high compared to some of the content creators that I've had the good fortune to know over the years, but I'm still excited 🙂! ClearTech Loop—On the…

📌 Q: Why is strong authentication and authorization: a critical foundation for Model Context Protocol (MCP) server security? A: Strong authentication and authorization are paramount for securing Model Context Protocol (MCP) server security because they establish a crucial layer…
📌 Q: What is Identity Spoofing in the context of #AgenticAI? A: In the context of agentic AI, identity spoofing refers to the malicious act of an attacker impersonating a legitimate AI agent or user to gain unauthorized access to systems, data, or resources. It involves…
📌 Q: How does a prompt injection attack in #AgenticAI work? A: Prompt injection attacks exploit the way large language models (LLMs) process input. Attackers craft specific prompts that include instructions designed to override the agent's original instructions or task…
📌The CISO role is evolving—and fast. In Episode 2 of The CISO Slant, UL Solutions CISO Scott Howitt joins me to unpack how CISOs can shift from risk gatekeepers to innovation enablers. From board engagement to governance transformation, this 10-minute conversation delivers…

📌 Q: In the context of #AISecurity, what is Intent Breaking A: Intent Breaking involves attackers exploiting vulnerabilities in an AI agent's planning and goal-setting capabilities. They try to manipulate or redirect the agent's objectives or reasoning, making it deviate from…
📌 Q: In a he context of #AISecurity, what is goal manipulation? A: With Goal Manipulation, Attackers target an AI agent's ability to plan and pursue its objectives by subtly altering its perceived goals or reasoning process. This can be achieved by injecting misleading…
📌 Launching: ClearTech Loop Weekly Cybersecurity isn’t standing still—and neither are we. I’m excited to introduce ClearTech Loop Weekly, a new LinkedIn newsletter where I’ll share key insights from each episode of the ClearTech Loop podcast. Think 10-minute conversations at…

📌 Q: What is a Model Context Protocol Server? A: A Model Context Protocol Server is a standardized "adapter" that allows AI models to interact with the real world beyond their training data. MCP follows a client-server architecture where AI applications (like chatbots or AI…