❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Understanding the Generative AI Attack Surface

By: Jo
28 November 2025 at 01:50
The rise of generative AI and large foundation models has unlocked capabilities that were unimaginable just a few years agoβ€”while simultaneously opening a new frontier of security risks. Generative AI, especially large language models (LLMs), represents only one branch of the broader AI ecosystem, but it’s the branch that has reshaped how modern enterprises operate. […]

How to do a Security Review – An Example

By: Jo
16 November 2025 at 03:36
Learn how to perform a complete Security Review for new product featuresβ€”from scoping and architecture analysis to threat modeling and risk assessment. Using a real-world chatbot integration example, this guide shows how to identify risks, apply security guardrails, and deliver actionable recommendations before release.

How to do your First Security Architecture Review!

By: Jo
9 November 2025 at 12:03
A security architecture review is a systematic assessment of an environment’s design, configuration, and controls to evaluate whether they meet security requirements and can withstand realistic threats. At some point, if you lean toward product or infrastructure security, you’ll inevitably find yourself doing a review like this. When I did my first one, I didn’t […]
❌
❌