Deploy Securely
Subscribe
Sign in
Home
Notes
Risk Assessment
Case studies
Products
Topics
About
Software supply chain
Latest
Top
Discussions
Almost 30% of enterprises deploying AI had an AI security breach, according to Gartner
(Accidental) insider threats look like the biggest risk.
Jul 11
•
Walter Haydock
1
Share this post
Almost 30% of enterprises deploying AI had an AI security breach, according to Gartner
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
Figma AI: security and privacy considerations
De-identification, subprocessors, and incentives.
Jul 7
•
Walter Haydock
Share this post
Figma AI: security and privacy considerations
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
3 ways to evaluate open source AI model security
SCA, AI-powered code review, and pre-deployment testing.
Jul 4
•
Walter Haydock
Share this post
3 ways to evaluate open source AI model security
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
3 lessons in AI resilience
ChatGPT, Claude, Perplexity, and maybe Google Gemini went down last week. Here are 3 lessons: Have failover plans The more generative AI becomes…
Jun 10
•
Walter Haydock
Share this post
3 lessons in AI resilience
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
The Slack AI training firestorm
Another PR disaster without much meat.
May 19
•
Walter Haydock
Share this post
The Slack AI training firestorm
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
OpenAI's Zero Data Retention
The most secure way to use SaaS generative AI tools.
Apr 30
•
Walter Haydock
Share this post
OpenAI's Zero Data Retention
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
The 3 biggest mistakes security leaders make with AI governance (and how to avoid them)
The frustrating reality security leaders face Have you felt off-track when trying to build out your AI governance, risk management, and compliance (GRC…
Mar 18
•
Walter Haydock
Share this post
The 3 biggest mistakes security leaders make with AI governance (and how to avoid them)
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
2
3 steps to understand vendor data protection and retention measures
What are you doing with my data? This is a key question for anyone you are (considering) giving it to. Which is why I previously put out a guide focused…
Mar 6
•
Walter Haydock
Share this post
3 steps to understand vendor data protection and retention measures
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
Are you staying on top of vendors processing your data with AI?
A free 3-step process to getting the answers you need to protect your sensitive information.
Feb 20
•
Walter Haydock
3
Share this post
Are you staying on top of vendors processing your data with AI?
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
How StackAware uses AI
Describe AI training with the CycloneDX SBOM format.
Feb 16
•
Walter Haydock
1
Share this post
How StackAware uses AI
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
M&A security: due diligence checklist
Security mergers and acquisitions (M&A) are heating up. While not exhaustive, below is a list of things you might consider requesting from an investment…
Dec 15, 2023
•
Walter Haydock
8
Share this post
M&A security: due diligence checklist
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
2
A risk analysis of Meta's Code Llama
Data retention and unintended training with self-hosted AI models.
Dec 1, 2023
•
Walter Haydock
7
Share this post
A risk analysis of Meta's Code Llama
blog.stackaware.com
Copy link
Facebook
Email
Note
Other
1
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts