Blog on SecurityBLOG ON SECURITY
  • About this blog

ai cybersecurity

AI pentest report analysis - part one: designing an agentic solution
agentic cybersecurity

AI pentest report analysis - part one: designing an agentic solution

Slash pentest report analysis time (and costs) with smart AI agents that do all the heavy lifting
Read More
Staff
Writing a SaaS vulnerability management policy using AI
free isms

Writing a SaaS vulnerability management policy using AI

Learn the basics of writing simple, ISO-compliant, vulnerability management policies for SaaS companies
Read More
Staff
Creating an LLM AI security checklist for rapid fieldwork use
ai cybersecurity

Creating an LLM AI security checklist for rapid fieldwork use

Learn how security teams can help companies safely adopt LLM AIs by using a fieldwork checklist based on OWASP
Read More
Staff
How to run data breach simulations
ai cybersecurity

How to run data breach simulations

Need to run a data breach simulation? Learn how to organise and execute them quickly and efficiently
Read More
Staff
Running rapid risk assessments using Google Gemini and Confluence
ai cybersecurity

Running rapid risk assessments using Google Gemini and Confluence

Need to run a risk assessment for a project or tool? Learn how Gemini and Confluence can help you do it faster
Read More
Staff
How to build a free ISMS with ChatGPT
free isms

How to build a free ISMS with ChatGPT

ChatGPT can accelerate the creation of a free Information Security Management System. Find out how in this post
Read More
Staff
Blog on Security © 2025
  • Subscribe
  • Privacy policy
  • Edoardo Gerosa
Powered by Ghost