Security
-
Introduction to SQL procedures, their applications and benefits, and how to encrypt SQL code
9 min read -
Making containers smaller is the most popular practice when reducing your attack surface. But how…
6 min read -
Overcoming Security Challenges in Protecting Shared Generative AI Environments
Artificial IntelligenceEnsuring Safe AI on Multi-Tenancy
15 min read -
Implementing row-level security in Power BI is a recurring task for developers. Let’s look at…
14 min read -
Prompt Experiments for Python Vulnerability Detection
12 min read -
Navigating privacy and security when implementing data sharing
14 min read -
One year after my first article on this topic, here is an update on new…
5 min read -
A review of popular techniques and remaining challenges
28 min read -
An introduction to the field, its applications, and current issues
25 min read