Create Guardrails for Company AI usage
Everyone wants to use AI – but what about the negative effects? Like losing data to the public – or “leaking data”? So how can AI be boxed in? Hallucinate…
Defend Your Systems
Everyone wants to use AI – but what about the negative effects? Like losing data to the public – or “leaking data”? So how can AI be boxed in? Hallucinate…
Futurism.com has a story on how Perplexity AI browser is not very good with security concerns: The vulnerability, known as an indirect prompt injection attack, is terrifyingly simple. “The vulnerability…
CVE-2025-24990. Microsoft’s legacy code nightmare. A driver for old fax modems (ltmdm64.sys) has been quietly sitting on every Windows system since 2006. Possibly even Windows XP, Windows 7, 10, 11,…
Posed a question to Grok about the Q-day timeline – and it came back with this: The question is designed for small business and using the DEFCON presentation mentioned below.…
Let’s discuss this question (How much to spend?) on cybersecurity… with a conversation of Jimmy and Jane who are small business owners and have certain viewpoints: Jimmy (Sales-Focused Owner): Hey…