Mike Williamson

284 Followers
424 Following
1.4K Posts

Digital Transformation = Agile + APIs + AppSec

Security Architect at the Public Health Agency of Canada. Formerly TBS Cyber security & part of the team that launched the Canadian Digital Service.

bloghttps://mikewilliamson.wordpress.com
githubhttps://github.com/sleepycat

Try to unsee it

Level: impossible.

Last year, my position was that we still had time to design PQ authentication mechanisms.

Now, based on the pace of progress and on statements like Google's, I believe:

1. we need to finish rolling out PQ key exchange yesterday
2. we need to start rolling out PQ auth now
3. it's too late to ship any new non-PQ design or system

https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/

Quantum frontiers may be closer than they appear

An overview of how Google is accelerating its timeline for post-quantum cryptography migration.

Google
Adults Lose Skills to AI. Children Never Build Them.

Discussions of cognitive offloading often miss a critical distinction: What AI does to a 45-year-old's brain is categorically different from what it does to a 14-year-old's.

Psychology Today

Sovereign by Design: Strategic Options for Canadian #AI #Sovereignty

"Canada still has options to strengthen our capacity, reduce foreign leverage, build partnerships, and modernize our institutions. However, the time to act is short."

#gcdigital #munkSchool

https://aicompetitiveness.ca/

Sovereign by Design | AI Competitiveness Project

Strategic Options for Canadian AI Sovereignty. A new report from the Munk School of Global Affairs & Public Policy, University of Toronto.

Digital Sovereignty: A Framework to improve digital readiness of the Government of Canada - Canada.ca

"The invisible #Unicode characters were devised decades ago and then largely forgotten. That is, until 2024, when hackers began using the characters to conceal malicious prompts fed to AI engines. While the text was invisible to humans and text scanners, #LLMs had little trouble reading them and following the malicious instructions they conveyed."

https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/

Supply-chain attack using invisible code hits GitHub and other repositories

Unicode that's invisible to the human eye was largely abandoned—until attackers took notice.

Ars Technica

"2025’s exploited vendors followed the same pattern we observed last year, with big tech experiencing the most zero-day exploitation and security vendors following directly behind.
...
#Cisco and #Fortinet remain commonly targeted networking and security vendors, while #Ivanti and #VMware continue to see exploitation that reflects the high value threat actors place on VPNs and virtualization platforms."

https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review

Look What You Made Us Patch: 2025 Zero-Days in Review | Google Cloud Blog

Our analysis of 90 zero-day vulnerabilities tracked in 2025, focusing on techniques and how AI will accelerate the vulnerability landscape.

Google Cloud Blog
If It Quacks Like a Package Manager

0 comments

Lobsters
They're threatening us with a good time again

Dutch government: Release report on dangers of using American hosting

Also Dutch Government: Signs contracts with American hosting companies

Still the Dutch Government: removes their own report on American hosting services, because it now makes them look bad.

Nieuwe kabinet, dezelfde onzin  

#thenetherlands #nederland #netherlands

Dutch gov't pulls report on dangers of American cloud service after criticism

The Ministry of Justice and Security removed a report on the risks of Amazon’s “European Sovereign Cloud” service shortly after publishing it. This followed critics saying that the report underestimates the service’s dangers and illustrates the government’s tunnel vision regarding American big tech, the Volkskrant reports.

NL Times