Taking longer than expected.
Reload the pageTaking longer than expected.
Reload the page4 articles tagged with “Security”
A defender-focused deep dive into prompt injection as of 2026. Real attack patterns (direct, indirect via retrieval, multi-turn, payload smuggling), concrete defences (input sanitisation, output validation, structured prompting, policy enforcement at the boundary), and authoritative source mapping to OWASP Top 10 for LLM Applications (LLM01), NIST AI 600-1, MITRE ATLAS, and the work of Simon Willison.
A practical guide to building the AI red team capability most enterprises are missing in 2026. What an AI red team is, how it differs from a traditional red team, the hiring versus outsourcing decision, a 90-day starter plan, the exercises to run first, and how it all maps to NIST AI 100-1, NIST AI 600-1, the AI Village at DEF CON, and the MLCommons AI Safety community.
An engineering-grade AIBOM playbook covering NTIA SBOM minimum elements adapted for AI, SPDX 3.0 AI profile fields, CycloneDX 1.6 ML-BOM components, EO 14110 reporting obligations, and how to generate one in CI.
A practical AI incident response runbook mapping prompt injection, output toxicity, DLP breaches, and model supply-chain compromise to NIST SP 800-61r2 and the NIST AI 600-1 GAI Profile.
Want to see how Areebi solves the challenges discussed in these articles?