Published inThe Salty HashAI Security Risks Are Real — Here’s 12 Questions to Ask Your Software VendorAs businesses integrate AI-powered features into their software, security remains a top concern. Vendors are promising cutting-edge AI…Feb 28Feb 28
Published inThe Salty Hash10 Essential Security Steps Before Launching Your AI FeatureAI features are taking over the software industry with almost any product you use today getting “enhanced” with AI features. Unfortunately…Feb 13Feb 13
Published inThe Salty HashOWASP’s Updated Top 10 LLM Includes Vector and Embedding WeaknessesThe Update Looks Beyond Models to the Whole AI StackJan 28Jan 28
Published inThe Salty HashPrivacy Guide to Apple Intelligence with ChatGPTPatrick’s Privacy Practices Part 3Dec 19, 20241Dec 19, 20241
Published inThe Salty HashPrivate Communications for Email and Text MessagesPatrick’s Privacy Practices Part 2Dec 12, 2024Dec 12, 2024
Published inThe Salty HashIdentity Theft Protection ChecklistPatrick’s Privacy Practices Part 1Dec 11, 2024Dec 11, 2024
Published inThe Salty HashBuild Your Own Application-Layer Encryption?Non-obvious Considerations and Why It’s More Complex Than It May SeemNov 14, 2024Nov 14, 2024
Published inThe Salty HashUsing MySQL’s Built-in Encryption: A Terrible Idea6 Reasons To Avoid MySQL’s Native Encryption FunctionsNov 14, 2024Nov 14, 2024
Published inThe Salty HashApplication-layer Encryption (ALE) Demo Using a Notes AppIt can be difficult to demo encryption. If you do it right, the encryption is invisible to users, but the hackers only see garbage data…Oct 17, 2024Oct 17, 2024
Published inThe Salty HashHow to talk to the business about AI security risksIf you’re on a security or engineering team and you’ve read our Securing Gen-AI White Paper, you probably understand that the addition of…Oct 16, 2024Oct 16, 2024