Darlene A.Security of Data Science and Data Science for Security1 — IntroductionAug 4, 2023Aug 4, 2023
Darlene A.The OWASP Top 10 for LLMs: A Light-hearted Look at Serious SecurityWelcome, dear readers, to the wild, wacky, and somewhat worrisome world of Large Language Models (LLMs)! Today, we’re diving into the OWASP…Aug 4, 2023Aug 4, 2023
Darlene A.API Authentication and AuthorizationYou see, API authentication is a lot like dating. You’ve got two parties who want to share some information, but before they get to the…Aug 3, 2023Aug 3, 2023
Darlene A.TCP flagsIn the IT world, when we talk about reliable communication across any systems, TCP is the underlying protocol responsible for such…Jul 24, 2022Jul 24, 2022
Darlene A.AES-256 encryptionCybercriminals are always on the prowl, looking for weak links to break and crack. How can users, especially in this increasingly connected…Jul 7, 2022Jul 7, 2022