Tag: Multi-cloud
-
Sentiment Analysis in Python using NLTK
Analyzing troves of reviews many organizations use for outreach and measurement but are they capturing the overall tone of a review? When I’m referencing the concept of tone I’m trying to extract from text on positive or negative reception. This is where Sentiment Analysis can be used to determine what is the reception tone whether…
-
Automated Red Teaming Agent in Azure Foundry
Your organization is likely navigating methods and uses of Generative AI whether this is innovation of a existing application that is internal to operations or a external web application the use of this technology should be thoroughly evaluated prior to release. You’ve likely encountered the term “Prompt Injection” however you’re also aware of automation that…
-
Azure Container Registry Continuous Patching
Introduction If your organization stores images in a repository chances are it’s hosted in a cloud based solution. Typically, every Cloud Service Provider has an offering in Azure this is known as Azure Container Registry. This stores your Docker Images, OCI Artifacts in a centralized location. You can also get the advantage if you’re using…
-
Network Security Perimeters in Azure
Introduction Microsoft has announced the public preview of Network Security Perimeters, a new Azure service that creates isolation boundaries for Platform-as-a-Service (PaaS) resources deployed outside your virtual network. With Network Security Perimeters, you can: This capability lets organizations define precise security perimeters around their Azure PaaS workloads controlling what external services can connect but also provide…
-
Hacking Kubernetes via ServiceAccountTokens
Kubernetes has a large amount of advancements and inherent good security principles but these are dependent on configurations that are typically not well-known to end users. Predominantly the constructs of Service Accounts or (Non-human Identities) for the masses are populated in many services as they act as the go-between for service to authenticate and operate…
-
Evaluations in Azure Foundry
Evaluations in the application of Generative AI serve as a backstop component to build trust and confidence in your AI-centric applications. Measuring the output and context as it is produced in your application can help you grasp in a verifiable method how your application will perform under certain conditions. Given the natural language usage of…
-
Image Policy Webhook
Image Policy Webhook is a native Kubernetes admission plugin that enforces security policies by validating container images before they are deployed. This ensures that only trusted and compliant images run in your environment. This will take the image that is attempted to be applied compare against predefined policies, and if those policies allow the image…
-
Garak Red Teaming LLMs
As Generative AI is playing a role in multiple organizations so is the popularity of tools for identifying risks and vulnerabilities. In this blog I’m exploring Garak a LLM vulnerability scanner developed by NVIDIA and is a OSS project to help strengthen LLM Security. When the term “Red Team” appears in the approach of simulation…
-
Bill of Materials CKS Refresher
A Software Bill of Materials (SBOM) is like the ingredients list on your food package—it reveals what components, libraries, and dependencies go into building the final software. Just as checking food labels helps you understand nutritional content and potential allergens, an SBOM provides transparency into third-party components, helping identify vulnerabilities early in the software supply…