AI Security: Understanding Prompt Injection

AI Security: Understanding Prompt InjectionAI Security: Understanding Prompt Injection

With the growth of more and more products leveraging technologies like ChatGPT, GPT-3, and other AIaaS (AI as a Service)…

A Review of “Story Time Chess”

I got a copy of Story Time Chess for my kid for Christmas. I took a bit of a gamble…

Why AI Search Is a Nightmare

Tech news is on fire with talks about how Microsoft plans to integrate ChatGPT into Bing. In response, Google has…

A Review of “Bobby Fischer Teaches Chess”

Bobby Fischer Teaches Chess is a great introductory work to learn how to play chess and how to start studying…

SIEM vs. SOAR for Security

SIEM and SOAR (Security Orchestration, Automation, and Response) are very similar ideas but are often compared in the security landscape.…

6 Great Chess Books to Read for Strategy and Tactics

Chess is the quintessential game of strategy. It pits 2 players against each other on a 64 square board with…

Understanding Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR) is the post-security answer to traditional antivirus and response tools. EDR is the evolution and…

How to Learn About Front-End Development

The front-end web development stack is made up of a number of tools that help you build the front-end of…

The Easiest Guide to Installing and Managing the Windows Subsystem for Linux (WSL)

The Windows Subsystem for Linux (WSL) is a powerful addition to Windows 10 and Windows 11. It allows you to…

Next Generation SIEM for Security

SIEM stands for Security Information and Event Management and is a platform which collects and collates data in a central…