👋 Sign in for the ability to sort posts by relevant, latest, or top.
2 min read
Acra. Features: Data leakage detection
How cryptography 💪works to protect ML models 02:05
Mitigating risk when implementing an analytics platform
What do appsec and fire extinguishers have in common?
Cloud security: gaps in a "shared responsibility" model
Skin in the Game: Hidden Asymmetries in Daily Life by Nassim Taleb
Less obvious parts of security asymmetries, by Eugene Pilyankevich
Managing the risk of not upgrading