What I Do?
I explain and teach technology, solve tech problems and help you make gadget buying decisions.
SUBSCRIBE TO OUR NEWSLETTER
Seven observations from Pillar’s “The State of Attacks on GenAI”
A security report on GenAI from Pillar, The State of Attacks on Generative AI, sheds…
Securing GenerativeAI: Key Emerging Threat Vectors and Guardrails for Amazon Bedrock
Ensuring the security of generative AI systems is critical, given their complex nature and potential…
What is the Enterprise IT Security Stack? – a quick guide for business stakeholders
Background – I’ve been working primarily in the cloud (IaaS and PaaS) for the past…
Why is Cybersecurity so Confusing for Business Stakeholders?
Navigating the cybersecurity landscape is a complex challenge for many business stakeholders. As someone with…
Seven observations from Pillar’s “The State of Attacks on GenAI”
A security report on GenAI from Pillar, The State of Attacks on Generative AI, sheds…
Securing GenerativeAI: Key Emerging Threat Vectors and Guardrails for Amazon Bedrock
Ensuring the security of generative AI systems is critical, given their complex nature and potential…
What is the Enterprise IT Security Stack? – a quick guide for business stakeholders
Background – I’ve been working primarily in the cloud (IaaS and PaaS) for the past…
What are the differences between OpenAI’s ChatGPT, InstructGPT, fine-tuned models, and Embedding models?
Are you like me and recently found out that OpenAI has multiple ways to consume…
Four business considerations for anyone in B2B thinking about GenAI adoption
This article aims to give business stakeholders an understanding of the major components of GenAI…