Securing LLM Applications: the devil is in the detail Share: Download MP3 Similar Tracks Cybersecurity Architecture: Five Principles to Follow (and One to Avoid) IBM Technology Integrate it Series Ep 2: Governance, Risk and Compliance IriusRisk What do tech pioneers think about the AI revolution? - BBC World Service BBC World Service How to avoid the biggest mistakes that new franchisors make Lime Licensing Group Andrew Ng Explores The Rise Of AI Agents And Agentic Reasoning | BUILD 2024 Keynote Snowflake Inc. Trump Thanks Qatar for Their Generous Jet Bribe & Accidentally Does a Socialism | The Daily Show The Daily Show Cybersecurity Architecture: Data Security IBM Technology How AI Could Save (Not Destroy) Education | Sal Khan | TED TED How to build a successful threat modeling program: Episode 5 - Delivering Value IriusRisk Transformers (how LLMs work) explained visually | DL5 3Blue1Brown Banking on Security? Why Threat Modeling is a solid investment. IriusRisk Cybersecurity Architecture: Networks IBM Technology Cybersecurity Architecture: Fundamentals of Confidentiality, Integrity, and Availability IBM Technology Did we do a good job?: Threat Modeling Series 6 - Results: IriusRisk Jeff and Bex Webinar: The AI Duo for Secure by Design IriusRisk Cybersecurity Architecture: Roles and Tools IBM Technology