Preventing PII Leakage through Text Generation AI Systems

Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations on how one can trick them into giving you information that was supposed to be blocked. This remains true despite continuous efforts to improve these ... Read More
Data Security and Privacy: Your Generative AI Application Doesn’t Need to Know Your Name

Data Security and Privacy: Your Generative AI Application Doesn’t Need to Know Your Name

A couple of weeks back, I was doing some research on some old mergers and acquisitions in the data security market when I found myself drawing a blank on the name of a startup that was purchased a while back. Online search was no help because I didn’t have any ... Read More

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the enterprise edition. Even then, the data protection capabilities offered in the enterprise edition are meant for the threat ... Read More

Data Security in MySQL is an evolving compliance and threat landscape

MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the enterprise edition. Even then, the data protection capabilities offered in the enterprise edition are meant for the threat ... Read More

Application Security Check Up