Written in
the Cards
In a landscape that shifts as quickly as AI Wonderland, we’re here to help you read the signs. Explore fresh tales, industry trends, and timely dispatches from the heart of Alice.
The Rise and Risk of Reasoning Agents
Rogue Agents: When Trusted AI Turns Against You
What happens when your AI agents turn against each other? Explore the rising threat of "rogue agents" in finance and learn how Alice uses layered guardrails to prevent autonomous cascades that could drain accounts.
Every Millisecond Counts: Latency Benchmarking of Alice Guardrails
AI needs to be fast to feel natural, but safety shouldn't slow it down. We benchmarked our guardrails under production loads to prove you can block risks in under 120ms without breaking the flow of the conversation.
How ISIS is Adopting AI Vol. 2: Inside QEF’s Media Strategy
ISIS’s media arm, QEF, has moved from passive AI curiosity to an active, multilingual propaganda strategy. This analysis highlights their use of privacy-first tools, Bengali outreach, and direct AI product endorsements—signaling a long-term shift in extremist operations.
How Knowledge Distillation Turns LLMs into Smarter Transformers
To support real-time GenAI safety at scale, we needed a way to deliver both accuracy and efficiency, without compromise. By leveraging the knowledge of Shield-Gemma, an open-source LLM, and applying a dual distillation framework (label-based + feature-based), we transferred its intelligence into a smaller, faster transformer optimized for production. The result? A model that’s not just lightweight and cost-effective, but also highly accurate in detecting abuse, even in complex, evasive domains. This technique now powers the real-time protections at the core of Alice's Guardrails, enabling scalable moderation with no trade-off between safety and speed.
Remote Control: How Moldovan Diasporas are Targeted by Shadow News Outlets Ahead of the Elections
Shadow news outlets are targeting Moldova’s diaspora with disinformation ahead of the 2025 elections. ActiveFence researchers uncover hidden influence operations using web-infrastructure clustering and multilingual crawling. Learn how we help enterprises stay ahead of covert threats.
Globally trusted for good reason.
Alice is led, supported, and backed by experts in communicative tech integrity. See how we use our unparalleled threat intelligence to continuously protect over 3 billion people worldwide.
Get a Demo