ActiveFence is now Alice
x
Alice - Blog

Written in
the Cards

In a landscape that shifts as quickly as AI Wonderland, we’re here to help you read the signs. Explore fresh tales, industry trends, and timely dispatches from the heart of Alice.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

New York RAISE Act Ushers in a New Era of AI Transparency

Jun 17, 2025
,
 
Jun 17, 2025
 -
5
 min read
June 17, 2025

See how the RAISE Act aims to stop AI-enabled crises.

Learn More

Alice Continues to Power Safety-First Enterprise AI with NVIDIA

Jun 11, 2025
,
 
Jun 11, 2025
 -
4
 min read
June 11, 2025

Scaling AI requires safety by design. Learn how Alice is integrating with NVIDIA NeMo Guardrails to provide real-time protection and help enterprises deploy AI agents that are secure, responsible, and aligned.

Learn More

FrameWar: A Wolf in Flutter’s Clothing

Jun 11, 2025
,
 
Jun 11, 2025
 -
5
 min read
June 11, 2025

Discover how cybercriminals are turning the Flutter development framework into an attack vector, fueling a new wave of stealthy mobile malware.

Learn More

Alice Powers the AI Safety Flywheel with NVIDIA

Jun 11, 2025
,
 
Jun 11, 2025
 -
7
 min read
June 11, 2025

Explore the AI Safety Flywheel from Alice and NVIDIA and see how we keep AI safe at scale.

Learn More

Exposing the Threat Landscape: A Taxonomy of GenAI Attack Vectors

Jun 4, 2025
,
 
Jun 4, 2025
 -
9
 min read
June 4, 2025

GenAI systems introduce a new and rapidly evolving attack surface. This taxonomy outlines the most common GenAI attack vectors; from prompt injection to multimodal evasion; and how enterprises can detect and defend against them.

Learn More

Seeing AI Security Through a Broader Lens

May 28, 2025
,
 
May 28, 2025
 -
5
 min read
May 28, 2025

Threat actors are exploiting GenAI in the wild. Learn why true AI security must extend beyond infrastructure to detect and prevent real-world misuse.

Learn More

Globally trusted for good reason.

Alice is led, supported, and backed by experts in communicative tech integrity. See how we use our unparalleled threat intelligence to continuously protect over 3 billion people worldwide.

Get a Demo