PinnedAI Under Siege: Navigating the New Frontier of Cybersecurity Threats in 2025Unveiling the Dark Side of AI: From Adversarial Attacks to Ethical DilemmasDec 15, 2024Dec 15, 2024
PinnedNavigating AI Adoption: Security Insights from OpenAI’s Enterprise PlaybookHow to use OpenAI’s latest blueprint to secure your AI journeyMay 7May 7
PinnedHow DeepSeek’s Open-Source AI Became Both a Hacker’s Dream and a CISO’s NightmareThe emergence of DeepSeek, a Chinese AI startup offering high-performance, cost-efficient, and open-source tools mean urgent implications…Jan 28Jan 28
Securing the AI-Powered Enterprise: Microsoft’s Best Practices for Safe AI AdoptionAs organisations race to integrate AI with business operations, security leaders must solve a multivariate problem: delivering AI…May 20May 20
AI Security Playbook: How to Protect Against Enterprise AI Adoption RisksBest Practices for Managing AI Risks and Ensuring Secure Deployments at ScaleMay 20May 20
AI Crypto Trading Bots: The Hidden Risks Every Trader Should KnowUnveiling the Security Challenges of Autonomous AI Agents in Cryptocurrency MarketsMay 16May 16
Certified Cloud Security Professional (CCSP) Study Guide and Exam Questions for 2025Below is an overview of the CCSP body of knowledge and exam questions, updated for 2025. Any questions or clarifications, please let me…Dec 31, 2024Dec 31, 2024
The Origins of DevSecOps: Lessons Learned for 2025How the DevSecOps movement was formed by a number of security minded technologists and lessons learned.Dec 31, 2024A response icon1Dec 31, 2024A response icon1
My First Paper on DevSecOpsBelow is a verbatim copy of my first musings on DevOps security before we had a name for it! The lack of enthusiasm for security in DevOps…Dec 31, 2024Dec 31, 2024
Data Security Posture Management Simplifies EU AI Act ComplianceUsing regulation and automation to overcome the incoming maelstrom of AI compliance obligationsDec 10, 2024Dec 10, 2024