{"id":6861,"date":"2025-02-14T14:24:22","date_gmt":"2025-02-14T22:24:22","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=6861"},"modified":"2025-12-02T19:23:00","modified_gmt":"2025-12-03T03:23:00","slug":"naml","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/naml\/","title":{"rendered":"Mission Critical AI: Automating Trust, Security, and Performance at Scale"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"600\" height=\"337\" title=\"NAML (3)\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=600%2C337&#038;ssl=1\" alt class=\"img-responsive wp-image-6876\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=66%2C37&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=177%2C99&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=200%2C112&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=320%2C180&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=400%2C225&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=460%2C258&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=500%2C281&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?resize=540%2C303&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?fit=600%2C337&amp;ssl=1 600w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 600px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><blockquote>\n<p><span>At the Naval Applications of Machine Learning (NAML) Conference 2025 in San Diego, our team presented a talk covering cutting-edge research on securing AI models against adversarial threats, focusing on trustworthy AI in defense and operational environments. Our work explores techniques to detect, assess, and remediate AI security vulnerabilities, even in low-compute and low-connectivity environments critical to naval and military applications. We will present our approach to evaluating AI trustworthiness, safeguarding models from adversarial attacks, and enhancing resilience in real-world deployments. Attendees will gain insights into our methodologies, along with a preview of our prototype tools designed to improve AI security in constrained operational settings. This session highlights how our research enables more secure AI adoption in mission-critical scenarios, empowering decision-makers to deploy AI confidently in high-stakes environments. We also presented a poster.<\/span><\/p>\n<\/blockquote>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1800\" height=\"1221\" title=\"IMG_6139\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=1800%2C1221&#038;ssl=1\" alt class=\"img-responsive wp-image-6932\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=66%2C45&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=177%2C120&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=200%2C136&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=300%2C203&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=320%2C217&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=400%2C271&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=460%2C312&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=500%2C339&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=540%2C366&amp;ssl=1 540w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=600%2C407&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=669%2C454&amp;ssl=1 669w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=700%2C475&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=768%2C521&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=800%2C543&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=940%2C637&amp;ssl=1 940w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=1024%2C694&amp;ssl=1 1024w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=1200%2C814&amp;ssl=1 1200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?resize=1536%2C1042&amp;ssl=1 1536w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/IMG_6139-scaled.jpg?fit=2560%2C1736&amp;ssl=1 2560w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 2560px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" style=\"--button_text_transform:uppercase;\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/underline.io\/events\/477\/sessions\/19525\/lecture\/115315-mission-critical-ai-automating-trust-security-and-performance-at-scale\"><span class=\"fusion-button-text\">Watch the Recording<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" style=\"--button_text_transform:uppercase;\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/sites.google.com\/go.spawar.navy.mil\/naml\/naml-2025\"><span class=\"fusion-button-text\">NAML 2025<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" style=\"--button_text_transform:uppercase;\" target=\"_self\" href=\"https:\/\/fortilayer.ai\"><span class=\"fusion-button-text\">FortiLayer Product<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-4 fusion-button-span-yes fusion-button-default-type\" style=\"--button_text_transform:uppercase;\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/?reference=NAML\"><span class=\"fusion-button-text\">Schedule Meeting<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":6876,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[60,17,100,62,59],"tags":[],"class_list":["post-6861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","category-event","category-fortilayer-product-page","category-machine-learning","category-sbir-projects"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mission Critical AI: Automating Trust, Security, and Performance at Scale - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"Mission Critical AI: Automating Trust, Security, and Performance at Scale\",\"datePublished\":\"2025-02-14T22:24:22+00:00\",\"dateModified\":\"2025-12-03T03:23:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/\"},\"wordCount\":4367,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/NAML-3.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"Artificial Intelligence\",\"Event\",\"FortiLayer Product Page\",\"Machine Learning\",\"SBIR Projects\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/\",\"name\":\"Mission Critical AI: Automating Trust, Security, and Performance at Scale - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/NAML-3.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-02-14T22:24:22+00:00\",\"dateModified\":\"2025-12-03T03:23:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/NAML-3.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/NAML-3.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/naml\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mission Critical AI: Automating Trust, Security, and Performance at Scale\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mission Critical AI: Automating Trust, Security, and Performance at Scale - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/naml\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/naml\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"Mission Critical AI: Automating Trust, Security, and Performance at Scale","datePublished":"2025-02-14T22:24:22+00:00","dateModified":"2025-12-03T03:23:00+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/naml\/"},"wordCount":4367,"image":{"@id":"https:\/\/objectsecurity.com\/naml\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?fit=600%2C337&ssl=1","articleSection":["Artificial Intelligence","Event","FortiLayer Product Page","Machine Learning","SBIR Projects"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/naml\/","url":"https:\/\/objectsecurity.com\/naml\/","name":"Mission Critical AI: Automating Trust, Security, and Performance at Scale - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/naml\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/naml\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?fit=600%2C337&ssl=1","datePublished":"2025-02-14T22:24:22+00:00","dateModified":"2025-12-03T03:23:00+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/naml\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/naml\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/naml\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/naml\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Mission Critical AI: Automating Trust, Security, and Performance at Scale"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/02\/NAML-3.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=6861"}],"version-history":[{"count":16,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6861\/revisions"}],"predecessor-version":[{"id":6951,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/6861\/revisions\/6951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/6876"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=6861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=6861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=6861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}