Posts by Rich Harang
Cybersecurity
Apr 29, 2025
Structuring Applications to Secure the KV Cache
When interacting with transformer-based models like large language models (LLMs) and vision-language models (VLMs), the structure of the input shapes the...
11 MIN READ
Cybersecurity
Feb 25, 2025
Defining LLM Red Teaming
There is an activity where people provide inputs to generative AI technologies, such as large language models (LLMs), to see if the outputs can be made to...
10 MIN READ
Cybersecurity
Feb 25, 2025
Agentic Autonomy Levels and Security
Agentic workflows are the next evolution in AI-powered tools. They enable developers to chain multiple AI models together to perform complex activities, enable...
14 MIN READ
Cybersecurity
Sep 18, 2024
NVIDIA Presents AI Security Expertise at Leading Cybersecurity Conferences
Each August, tens of thousands of security professionals attend the cutting-edge security conferences Black Hat USA and DEF CON. This year, NVIDIA AI security...
9 MIN READ
Cybersecurity
Jul 11, 2024
Defending AI Model Files from Unauthorized Access with Canaries
As AI models grow in capability and cost of creation, and hold more sensitive or proprietary data, securing them at rest is increasingly important....
6 MIN READ
Generative AI
Nov 15, 2023
Best Practices for Securing LLM-Enabled Applications
Large language models (LLMs) provide a wide range of powerful enhancements to nearly any application that processes text. And yet they also introduce new risks,...
11 MIN READ