Deploy Securely
Subscribe
Sign in
Home
Notes
Services
Case studies
Topics
About
Security operations
Latest
Top
Discussions
Why logging into ChatGPT reduces AI risk
(and why "anonymous" prompting might not be)
Oct 22
•
Walter Haydock
1
Share this post
Deploy Securely
Why logging into ChatGPT reduces AI risk
Copy link
Facebook
Email
Notes
More
How AI-powered companies can implement ISO 42001 control A.8.4 to rebuild trust after an incident
The only thing worse than an AI incident is being unprepared for one.
Sep 15
•
Walter Haydock
1
Share this post
Deploy Securely
How AI-powered companies can implement ISO 42001 control A.8.4 to rebuild trust after an incident
Copy link
Facebook
Email
Notes
More
Cyber insurance: what is it good for?
Red flags to look for and how to deal with them.
Aug 20
•
Walter Haydock
Share this post
Deploy Securely
Cyber insurance: what is it good for?
Copy link
Facebook
Email
Notes
More
3 levels of AI
Models, apps, and agents.
Jun 14
•
Walter Haydock
2
Share this post
Deploy Securely
3 levels of AI
Copy link
Facebook
Email
Notes
More
5 security and privacy questions about Apple Intelligence
Does Elon Musk have a point?
Jun 11
•
Walter Haydock
2
Share this post
Deploy Securely
5 security and privacy questions about Apple Intelligence
Copy link
Facebook
Email
Notes
More
Chatbot checklist: 5 ways to avoid AI-powered fails
Protect your chatbot from becoming a PR nightmare.
Mar 30
•
Walter Haydock
1
Share this post
Deploy Securely
Chatbot checklist: 5 ways to avoid AI-powered fails
Copy link
Facebook
Email
Notes
More
Autonomous agent accelerator: 6 ways to secure AI-powered workflows
How to have AI agents run your business without going rogue.
Mar 20
•
Walter Haydock
1
Share this post
Deploy Securely
Autonomous agent accelerator: 6 ways to secure AI-powered workflows
Copy link
Facebook
Email
Notes
More
The 3 biggest mistakes security leaders make with AI governance (and how to avoid them)
The frustrating reality security leaders face Have you felt off-track when trying to build out your AI governance, risk management, and compliance (GRC…
Mar 18
•
Walter Haydock
Share this post
Deploy Securely
The 3 biggest mistakes security leaders make with AI governance (and how to avoid them)
Copy link
Facebook
Email
Notes
More
2
Get a Microsoft 365 Copilot security teardown without hours of documentation review
Deploying securely with the world's most valuable company's enterprise AI tool.
Jan 24
•
Walter Haydock
7
Share this post
Deploy Securely
Get a Microsoft 365 Copilot security teardown without hours of documentation review
Copy link
Facebook
Email
Notes
More
2
Declaring a truce on SaaS security
Break out of the prisoner's dilemma.
Feb 17, 2023
•
Walter Haydock
3
Share this post
Deploy Securely
Declaring a truce on SaaS security
Copy link
Facebook
Email
Notes
More
What is the difference between a software vulnerability and a security misconfiguration?
A clear definition.
Jan 27, 2023
•
Walter Haydock
6
Share this post
Deploy Securely
What is the difference between a software vulnerability and a security misconfiguration?
Copy link
Facebook
Email
Notes
More
How to ask for career advice in cybersecurity
The right way to go about it.
Jan 20, 2023
•
Walter Haydock
3
Share this post
Deploy Securely
How to ask for career advice in cybersecurity
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts