Deploy Securely
Subscribe
Sign in
Home
Notes
Services
Case studies
Topics
About
Security operations
Latest
Top
Discussions
Why logging into ChatGPT reduces AI risk
(and why "anonymous" prompting might not be)
Oct 22, 2024
•
Walter Haydock
1
How AI-powered companies can implement ISO 42001 control A.8.4 to rebuild trust after an incident
The only thing worse than an AI incident is being unprepared for one.
Sep 15, 2024
•
Walter Haydock
1
Cyber insurance: what is it good for?
Red flags to look for and how to deal with them.
Aug 20, 2024
•
Walter Haydock
3 levels of AI
Models, apps, and agents.
Jun 14, 2024
•
Walter Haydock
2
5 security and privacy questions about Apple Intelligence
Does Elon Musk have a point?
Jun 11, 2024
•
Walter Haydock
2
Chatbot checklist: 5 ways to avoid AI-powered fails
Protect your chatbot from becoming a PR nightmare.
Mar 30, 2024
•
Walter Haydock
1
Autonomous agent accelerator: 6 ways to secure AI-powered workflows
How to have AI agents run your business without going rogue.
Mar 20, 2024
•
Walter Haydock
2
The 3 biggest mistakes security leaders make with AI governance (and how to avoid them)
The frustrating reality security leaders face Have you felt off-track when trying to build out your AI governance, risk management, and compliance (GRC…
Mar 18, 2024
•
Walter Haydock
2
Get a Microsoft 365 Copilot security teardown without hours of documentation review
Deploying securely with the world's most valuable company's enterprise AI tool.
Jan 24, 2024
•
Walter Haydock
7
2
Declaring a truce on SaaS security
Break out of the prisoner's dilemma.
Feb 17, 2023
•
Walter Haydock
3
What is the difference between a software vulnerability and a security misconfiguration?
A clear definition.
Jan 27, 2023
•
Walter Haydock
6
How to ask for career advice in cybersecurity
The right way to go about it.
Jan 20, 2023
•
Walter Haydock
3
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts