Security Feed
  1. Archives

Feb 03 2025 Implement effective data authorization mechanisms to secure your data used in generative AI applications – part 2

Source

In part 1 of this blog series, we walked through the risks associated with using sensitive data as part of your generative AI application. This overview provided a baseline of the challenges of using sensitive data with a non-deterministic large language model (LLM) and how to mitigate these challenges with Amazon Bedrock Agents. The next [...]

Posted by Riggs Goodman III on Mon 03 February 2025 in AWS Security.

Tags: Advanced (300), Amazon Bedrock, Best Practices, Generative AI, Security, Identity, & Compliance, Thought Leadership, Security Blog.

Categories

  1. Ars Technica
  2. AWS Security
  3. BleepingComputer
  4. Brian Krebs
  5. Bruce Schneier
  6. GCP Security
  7. Google Project Zero
  8. The Daily Swig
  9. The Guardian
  10. The Register
  11. Threatpost

Tag cloud

  • Security
  • Uncategorized
  • Security, Identity, & Compliance
  • Biz & IT
  • Security Blog
  • Microsoft
  • Security & Identity
  • Google
  • cryptocurrency
  • AI
  • Announcements
  • Foundational (100)
  • A Little Sunshine
  • Legal
  • Apple
  • Artificial Intelligence
  • privacy
  • Mobile
  • squid
  • Advanced (300)
  • Intermediate (200)
  • The Coming Storm
  • hacking
  • Technical How-to
  • Best Practices

Security Feed. Powered by Pelican and m.css. Code is available on GitLab.