Deploy Securely
Subscribe
Sign in
Home
Notes
Services
Case studies
Topics
About
Vulnerability management
Latest
Top
Discussions
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 4
Reporting your results.
Oct 20, 2023
5
Share this post
Deploy Securely
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 4
Copy link
Facebook
Email
Notes
More
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 3
Doing the math for AI risk.
Oct 13, 2023
3
Share this post
Deploy Securely
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 3
Copy link
Facebook
Email
Notes
More
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 2
Defining business and security requirements.
Oct 6, 2023
3
Share this post
Deploy Securely
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 2
Copy link
Facebook
Email
Notes
More
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 1
Setting the scope.
Sep 29, 2023
Â
•
Â
Walter Haydock
15
Share this post
Deploy Securely
The Artificial Intelligence Risk Scoring System (AIRSS) - Part 1
Copy link
Facebook
Email
Notes
More
5
How to track AI vulnerabilities?
Not like the existing CVE regime.
Aug 25, 2023
Â
•
Â
Walter Haydock
10
Share this post
Deploy Securely
How to track AI vulnerabilities?
Copy link
Facebook
Email
Notes
More
Set up CISA Cyber Hygiene and put it on autopilot
The good, the bad, the ugly.
May 19, 2023
Â
•
Â
Walter Haydock
2
Share this post
Deploy Securely
Set up CISA Cyber Hygiene and put it on autopilot
Copy link
Facebook
Email
Notes
More
Vulnerability chaining: part 2, breaking through the exterior
Turning ideas into action.
Apr 7, 2023
Â
•
Â
Walter Haydock
1
Share this post
Deploy Securely
Vulnerability chaining: part 2, breaking through the exterior
Copy link
Facebook
Email
Notes
More
Vulnerability chaining: part 1, a logical model
Laying the groundwork for a statistical one.
Mar 24, 2023
Â
•
Â
Walter Haydock
4
Share this post
Deploy Securely
Vulnerability chaining: part 1, a logical model
Copy link
Facebook
Email
Notes
More
Can ChatGPT convert unstructured vulnerability reports into CycloneDX VEX statements (and vice versa)?
Diving into AI applications for cybersecurity.
Mar 10, 2023
Â
•
Â
Walter Haydock
2
Share this post
Deploy Securely
Can ChatGPT convert unstructured vulnerability reports into CycloneDX VEX statements (and vice versa)?
Copy link
Facebook
Email
Notes
More
What do exploit, exploitable, and exploit code mean in cybersecurity terms?
Trying to clear up some confusion.
Feb 24, 2023
Â
•
Â
Walter Haydock
1
Share this post
Deploy Securely
What do exploit, exploitable, and exploit code mean in cybersecurity terms?
Copy link
Facebook
Email
Notes
More
What software security regulation should (not) look like
A response to CISA's recent Foreign Affairs piece.
Feb 3, 2023
Â
•
Â
Walter Haydock
5
Share this post
Deploy Securely
What software security regulation should (not) look like
Copy link
Facebook
Email
Notes
More
8
What is the difference between a software vulnerability and a security misconfiguration?
A clear definition.
Jan 27, 2023
Â
•
Â
Walter Haydock
6
Share this post
Deploy Securely
What is the difference between a software vulnerability and a security misconfiguration?
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts