Cross icon
Test your LLM for oversharing!  Test for real-world oversharing risks with role-specific prompts that mimic  real workplace questions. FREE - Start Now
protect icon

A new era requires a new set of solutions
Knostic delivers it

Skip to main content
Skip to main content

In my career, I have had an unusual amount of success in finding interesting patterns that help me seemingly predict rough outlines of the future (think of it as Sounil's version of psychohistory). What I plan to share over the course of the next several weeks is my technique for seeing these patterns. Follow Knostic if you want to keep up with my latest ruminations.

The Cyber Defense Matrix is a model that I created to organize cybersecurity vendors and predict future capabilities we need in this field. However, it's not the future that I am predicting, but rather gaps in the present that point towards potential needs.

Mental models such as the Cyber Defense Matrix provide structure and help us find gaps to anticipate future needs. But they can also limit our thinking by keeping us within a proverbial box (or 25 boxes in the case with the Cyber Defense Matrix.)

There two ways to break out of this mental jail.

  1. One is to tweak the exist mental model. (I've gotten this suggestion many times now with the Cyber Defense Matrix. e.g., Can you add another column/row to represent Govern in the Cyber Defense Matrix?)
  2. But the other way to break out of the box is to look at an entirely different mental model and find conceptual linkages between the models.

In their book "Surfaces and Essences," Hofstadter and Sander suggest that Einstein's most advanced breakthroughs came from "an analogical leap that was analogous to another analogical leap." They further recount that Maxwell observed that he was attracted by parallels between parallels among different principles of physics. These additional layers of abstraction can be difficult to grasp at first, but the profundity that emerges is clear.

The implication here is that real breakthroughs emerge when you combine mental models, particularly across different domains. As an example, we have made meaningful progress in our understanding of cybersecurity through the merger of military-centric models such as the OODA loop and Kill Chain with cybersecurity.

This has inspired me to embark on a quest to discover deep linkages among mental models. I have made a few conceptual breakthroughs through the discovery of linkages among some cybersecurity-related mental models that most of us are already familiar with and I write with the hope that my readers can help find more. Who knows, maybe through this journey, we will discover cybersecurity's own grand unification theory.

Links to the Merging Mental Models series

Data Leakage Detection and Response for Enterprise AI Search

Learn how to assess and remediate LLM data exposure via Copilot, Glean and other AI Chatbots with Knostic.

Get Access

Mask group-Oct-30-2025-05-23-49-8537-PM

The Data Governance Gap in Enterprise AI

See why traditional controls fall short for LLMs, and learn how to build policies that keep AI compliant and secure.

Download the Whitepaper

data-governance

Rethinking Cyber Defense for the Age of AI

Learn how Sounil Yu’s Cyber Defense Matrix helps teams map new AI risks, controls, and readiness strategies for modern enterprises.

Get the Book

Cyber Defence Matrix - cover

Extend Microsoft Purview for AI Readiness

See how Knostic strengthens Purview by detecting overshared data, enforcing need-to-know access, and locking down AI-driven exposure.

Download the Brief

copilot-img

Build Trust and Security into Enterprise AI

Explore how Knostic aligns with Gartner’s AI TRiSM framework to manage trust, risk, and security across AI deployments.

Read the Brief

Image-1

Real Prompts. Real Risks. Real Lessons.

A creative look at real-world prompt interactions that reveal how sensitive data can slip through AI conversations.

Get the Novella

novella-book-icon

Stop AI Data Leaks Before They Spread

Learn how Knostic detects and remediates oversharing across copilots and search tools, protecting sensitive data in real time.

Download the Brief

Solution Brief

Accelerate Copilot Rollouts with Confidence

Equip your clients to adopt Copilot faster with Knostic's AI security layer, boosting trust, compliance, and ROI.

Get the One-Pager

cover 1

Reveal Oversharing Before It Becomes a Breach

See how Knostic detects sensitive data exposure across copilots and search, before compliance and privacy risks emerge.

View the One-Pager

cover 1

Unlock AI Productivity Without Losing Control

Learn how Knostic helps teams harness AI assistants while keeping sensitive and regulated data protected.

Download the Brief

safely-unlock-book-img

Balancing Innovation and Risk in AI Adoption

A research-driven overview of LLM use cases and the security, privacy, and governance gaps enterprises must address.

Read the Study

mockup

Secure Your AI Coding Environment

Discover how Kirin prevents unsafe extensions, misconfigured IDE servers, and risky agent behavior from disrupting your business.

Get the One-Pager

cover 1
bg-shape-download

See How to Secure and Enable AI in Your Enterprise

Knostic provides AI-native security and governance across copilots, agents, and enterprise data. Discover risks, enforce guardrails, and enable innovation without compromise.

195 1-min
background for career

What’s next?

Want to solve oversharing in your enterprise AI search? Let's talk.

Knostic offers the most comprehensively holistic and impartial solution for enterprise AI search.

protect icon

Knostic leads the unbiased need-to-know based access controls space, enabling enterprises to safely adopt AI.