Cal J Hudson Profile picture
Nov 23 19 tweets 5 min read Twitter logo Read on Twitter
18 free resources to understand Generative AI Security 👇
1/ Amazon - What is Generative AI?

aws.amazon.com/what-is/genera…
2/ OWASP AI Exchange

owasp.org/www-project-ai…
3/ Google’s Secure AI Framework

blog.google/technology/saf…
4/ Google Cloud Security AI Workbench

cloud.google.com/security/ai
5/ Amazon’s Generative AI Security Scoping Matrix

aws.amazon.com/blogs/security…
6/ NIST AI Risk Management Framework

nist.gov/itl/ai-risk-ma…
7/ OWASP AI Security & Privacy Guide

owasp.org/www-project-ai…
8/ OWASP Top 10 Risks for LLM Applications

owasp.org/www-project-to…
9/ Accenture 5 Generative AI Security Steps

accenture.com/us-en/blogs/cl…
10/ CSA Top 5 Security Trends in Gen AI

cloudsecurityalliance.org/blog/2023/10/0…
11/ Who Will AI Help More - Attacks or Defenders

danielmiessler.com/p/will-ai-help…
12/ AI Defenders Will Protect Against Manipulation

danielmiessler.com/p/ai-defenders…
13/ The AI Attack Surface Map

danielmiessler.com/p/the-ai-attac…
14/ AI Threat Modelling Framework for Policymakers

danielmiessler.com/p/athi-an-ai-t…
15/ Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection

arxiv.org/abs/2302.12173
16/ MITRE ATLAS Matrix

atlas.mitre.org
17/ ENISA Multilayer Framework for Good Cybersecurity Practices for AI

enisa.europa.eu/publications/m…
18/ ENISA Cybersecurity of AI and Standardisation

enisa.europa.eu/publications/c…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Cal J Hudson

Cal J Hudson Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @caljhud

Nov 24
Burp Suite 101 For Beginners ✅

Burp Suite is a software security application used for penetration testing of web applications.

Learn for free 👇
Step 1 - Introduction and Installation:

hacklido.com/blog/621-burps…
Step 2 - Understanding Navigation, Dashboard, Configuration:

hacklido.com/blog/624-burp-…
Read 7 tweets
Nov 20
A Roadmap to a Career in Governance, Risk & Compliance (GRC) 🚨

- Fundamentals
- Education
- Certs
- Skills
- Practical Experience
- Job Opportunities

Breakdown below 👇
GRC aims to ensure an organisation manages security risks effectively, complies with regulations, and aligns its operations with its overall objectives.

Simple right?
GOVERNANCE

Processes and structures used to ensure an organisation's activities meet the needs of the business in line with policy and regulatory limitations.

It involves strategy, resource planning, and coordinating the team towards a common goal.
Read 15 tweets
Nov 15
Do you want to become a CISO?

Microsoft published a CISO workshop covering all aspects of a comprehensive security program: strategy, roles and responsibilities, success metrics, maturity models, & more.

This workshop builds a foundation for every aspiring CISO.

Link below 👇 Image
If you found this valuable, I'd greatly appreciate if you gave the first post a Like / RT.

It signals to me what type of content is useful to you.

If you'd like to discuss more, visit the Calpha Community Discord 👍

Have a great day!
Read 4 tweets
Nov 14
Build your own SOC at home for $0 🚨

If you're hoping to land a role in a SOC, this home lab will help you with real-world tools and practical techniques!

Instruction/build below👇
1/ Foundational Steps:

✅ Setting up Virtualbox for Home-Lab

✅ Download Wazuh with Elastic Stack medium.com/@rajneesh_gupt…
documentation.wazuh.com/current/deploy…
2/ Install security modules:

☑️ Install Suricata


☑️ Install YARA
medium.com/@rajneesh_gupt…
yara.readthedocs.io/en/stable/gett…
Read 10 tweets
Oct 27
Misconfigurations are the cause of a significant number of data breaches.

That’s why the NSA/CISA recently released their Top 10 Cybersecurity Misconfigurations.

Let’s dive into the Top 10 items they identify (not in priority order) 👇

Link below.
These items should come as no surprise. They’re simple in theory, complex in practice.

NIST defines a misconfiguration as: An incorrect or suboptimal configuration of an information system or system component that may lead to vulnerabilities.
1/ Default Configurations of Software and Applications

Issues such as default credentials, permissions and configurations are still a common attack vector that gets exploited.
Read 15 tweets
Oct 23
I got a DM today from a computer science major interested in a career in cyber security.

He asked me 7 questions about working in cyber security.

Here are my responses 👇
1/ What are the most in-demand cybersecurity skills in the market today?

We need more doers with engineering skills, specifically in a cloud context.

Soon, LLM related security skills will be in high demand (no one is preparing – everyone is only listening or thinking)
2/ What advice would you give to someone who is interested in a career in cybersecurity?

Follow your curiosity.

Find what sets your interest on fire.

No domain is off limits if you allow yourself the time to learn and grow into a person capable of mastering it.
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(