PinnedJustin Narine-RamsepaulThe OWASP Large Language Model Applications Top 10: A Deep DiveLLM Security: A deep dive into the OWASP Large Language Model Top 10Nov 11, 2023Nov 11, 2023
PinnedJustin Narine-RamsepaulDeception for Detection - Catching the Intruder’s Hand in the HoneyPotThe Apiary Framework aims to provide a structured approach to the deployment and management of honeypots on a network.Aug 11, 2022Aug 11, 2022
Justin Narine-RamsepaulThe Internet of Agents: What you need to know about collaborative AI Agents and the security risksResearchers from Tsinghua University, Peking University, Beijing University of Posts and Telecommunications, and Tencent have created a new…Jul 17Jul 17
Justin Narine-RamsepaulSafeguarding Sensitive Data: Why Data Classification is Essential for Enterprise AI ModelsAs businesses increasingly adopt Large Language Models (LLMs) like Chat GPT-4, these AI systems are becoming integral to operations, from…Jul 7Jul 7
Justin Narine-RamsepaulBackup and Recovery Solutions: An underrated attack surfaceLearn why threat actors target Backup and Recovery Solutions and how to secure them from attacks.Apr 30Apr 30
Justin Narine-RamsepaulWhy is my Outlook account named “ADMIN SERVICE”?A story of a threat actor group from Nigeria and the compromise of an Outlook accountApr 24, 2021Apr 24, 2021