Kubernetes under the Microscope:How secure is your clusterSetting up cluster in K8s is so challenging , that security becomes an after thought in K8s. Most of us think cloud environment is secure…2d ago2d ago
Never Trust always verify: Zero trust ModelNever Trust always verify , that phrase has made quite a buzz lately, I’m aware! What really stuck out to me in this conversation was the…5d ago5d ago
Quantum Computing: The End of Encryption or the Start of a New Era?The rise of quantum computing is double edged sword . For decades, encryption has been the cornerstone of digital security, keeping our…Jan 19Jan 19
Securing AI Episode 5: LLM uncoveredIn my previous discussions on LLM security, I explored various types of attacks, including the OWASP Top 10 for LLMs, red teaming attacks…Jan 16Jan 16
Securing AI Episode 4: LLM uncoveredIn our last episode, we explored direct search, token manipulation, and gradient-based attacks. Today, we shift our focus to uncovering…Jan 12Jan 12
Demystifying Dynamic SSL pinning: For Secure mobile CommunicationRevolutionize App’s Security with Dynamic pinningJan 9Jan 9
Securing AI Episode 3: LLM uncoveredResuming our journey through LLM security, let’s pick up from where we last left off and delve deeper into critical subjects.Jan 6Jan 6
Securing AI Episode2:LLM uncoveredPicking up where we left off in our journey through LLM security, we explored the critical topic in our previous discussions.Jan 3Jan 3
Securing AI Episode1:LLM uncoveredAI is changing the way we work, and tools like GPT and BERT are leading the way. Imagine asking a chatbot a simple question, only to have…Dec 30, 2024Dec 30, 2024
The Unseen Battle: AI SecurityAI is transforming our world ,weaving itself into every aspects of daily lifeDec 7, 2024Dec 7, 2024