Deploy Securely
Subscribe
Sign in
Home
Notes
Services
Case studies
Topics
About
Software supply chain
Latest
Top
Discussions
2nd party contractual risk
How detailed usage restrictions on AI content help no one.
Dec 9
•
Walter Haydock
Share this post
Deploy Securely
2nd party contractual risk
Copy link
Facebook
Email
Notes
More
How StackAware describes AI training
Managing risk through clear language.
Dec 4
•
Walter Haydock
Share this post
Deploy Securely
How StackAware describes AI training
Copy link
Facebook
Email
Notes
More
Yes, you are using AI
Pretending otherwise is a security risk.
Oct 13
•
Walter Haydock
1
Share this post
Deploy Securely
Yes, you are using AI
Copy link
Facebook
Email
Notes
More
A 3-level framework for security leaders to assess -aaS GenAI security
Training and data retention considerations when using SaaS and PaaS.
Sep 16
•
Walter Haydock
1
Share this post
Deploy Securely
A 3-level framework for security leaders to assess -aaS GenAI security
Copy link
Facebook
Email
Notes
More
How we implement ISO 42001 control A.10.3 and help clients do the same to manage AI vendor risk
AI risk management throughout the supply chain can be a compliance requirement.
Sep 13
•
Walter Haydock
Share this post
Deploy Securely
How we implement ISO 42001 control A.10.3 and help clients do the same to manage AI vendor risk
Copy link
Facebook
Email
Notes
More
How StackAware analyzes a vendor's security and AI governance just using its website
Just how they talk can tell you A LOT.
Aug 26
•
Walter Haydock
Share this post
Deploy Securely
How StackAware analyzes a vendor's security and AI governance just using its website
Copy link
Facebook
Email
Notes
More
Almost 30% of enterprises deploying AI had an AI security breach, according to Gartner
(Accidental) insider threats look like the biggest risk.
Jul 11
•
Walter Haydock
1
Share this post
Deploy Securely
Almost 30% of enterprises deploying AI had an AI security breach, according to Gartner
Copy link
Facebook
Email
Notes
More
Figma AI: security and privacy considerations
De-identification, subprocessors, and incentives.
Jul 7
•
Walter Haydock
2
Share this post
Deploy Securely
Figma AI: security and privacy considerations
Copy link
Facebook
Email
Notes
More
3 ways to evaluate open source AI model security
SCA, AI-powered code review, and pre-deployment testing.
Jul 4
•
Walter Haydock
Share this post
Deploy Securely
3 ways to evaluate open source AI model security
Copy link
Facebook
Email
Notes
More
3 lessons in AI resilience
ChatGPT, Claude, Perplexity, and maybe Google Gemini went down last week. Here are 3 lessons: Have failover plans The more generative AI becomes…
Jun 10
•
Walter Haydock
Share this post
Deploy Securely
3 lessons in AI resilience
Copy link
Facebook
Email
Notes
More
The Slack AI training firestorm
Another PR disaster without much meat.
May 19
•
Walter Haydock
Share this post
Deploy Securely
The Slack AI training firestorm
Copy link
Facebook
Email
Notes
More
OpenAI's Zero Data Retention
The most secure way to use SaaS generative AI tools.
Apr 30
•
Walter Haydock
1
Share this post
Deploy Securely
OpenAI's Zero Data Retention
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts