Latest — 05 Jun 2025 Google Cloud Run Security Best Practices A brief on security best practices for Google Cloud Run serverless container platform.
Have You Been Pwned? A Reboot A brief on Have I Been Pwned 2.0, a reboot of Troy Hunt's popular breach tracking service.
Llama Firewall: Comprehensive Guardrails for LLM Applications A brief on Llama Firewall from Meta, a comprehensive system of guardrails for securing LLM applications and agents.
Content Safety with Llama Guard and Groq A brief on content safety (according to MLCommons taxonomy) using Meta Llama Guard and Groq Cloud.
CSA AI Controls Matrix: A Sneak Preview A sneak preview into CSA AI Controls Matrix, the latest framework addressing AI security needs.
Supercharge Web Scraping and Extraction with Firecrawl A brief on Firecrawl, an open source tool for web scraping and data extraction.
ICANN Sunsets WHOIS: What Does This Mean For You? A brief on the recent announcement from ICANN to sunset WHOIS in favour of RDAP.
LLM Safety and Security with Google Cloud Model Armor A brief on Google Cloud Model Armor, a fully managed service for the safety and security of LLM applications.
OWASP Non-Human Identities (NHI) Top 10 Risks A gist of the latest OWASP Non-Human Identities (NHI) Top 10 risks.
Detect Jailbreaks and Prompt Injections with Meta Prompt Guard A brief on detecting prompt attacks like injection and jailbreaks using Meta Prompt Guard.