Explained: The OWASP Top 10 for Large Language Model Applications

  Рет қаралды 27,899

IBM Technology

IBM Technology

Күн бұрын

Пікірлер
@letsgoo506
@letsgoo506 7 ай бұрын
I know many companies, using A.I to generate letters or emails, that most likely hold some personal, or sensitive information, that don't realize that this is even possible. I'm glad I watch these videos, so I myself know the dangers that the future of A.I holds in these situations. Thank you.
@jeffcrume
@jeffcrume 4 ай бұрын
I’m glad you are learning from these videos!
@venkaraj
@venkaraj 4 ай бұрын
So insightful and easy to comprehend
@rsharma7197
@rsharma7197 11 ай бұрын
Very good session on the 3 of the Top 10. Where can I listen to the remaining?
@jeffcrume
@jeffcrume 11 ай бұрын
Thanks! I didn’t figure most viewers would want a video that long but you can read about the rest at the link in the description
@tgau
@tgau Жыл бұрын
If I could, I'd give two 👍 Easy to understand and precise. Thank you.
@jeffcrume
@jeffcrume Жыл бұрын
Thanks so much, @tgau!
@ravi4044
@ravi4044 Жыл бұрын
Great explanation 👏🏽
@ultimate_true_happiness
@ultimate_true_happiness Жыл бұрын
Great session as always
@ishwaryanarayan1010
@ishwaryanarayan1010 6 ай бұрын
Great information. Can you please do remaining owasp 10 for LLM ?
@Matinirx
@Matinirx Жыл бұрын
There's always somebody that's going to come in and gum up the works 🙃
@jeffcrume
@jeffcrume Жыл бұрын
It think it’s one of the immutable laws of the universe 😂
@tombesore
@tombesore Жыл бұрын
Terrific content but I'd like to suggest a change in the title to "Top 3 plus Bonus!" What happened to the other 7?
@jeffcrume
@jeffcrume Жыл бұрын
Unfortunately, we have to keep it shorter for this format so I do the best I can with tight time constraints
@derter2007
@derter2007 7 ай бұрын
They ran out of tokens
@ThiliRocks
@ThiliRocks 6 ай бұрын
​​​@@jeffcrume great video. Thanks. Would like to see the remaining 6 in a separate video.
@tyrojames9937
@tyrojames9937 Жыл бұрын
INTERESTING!😁
@freddysantana8475
@freddysantana8475 7 ай бұрын
Muy buena explicacion, Saco Chela.
@jeffcrume
@jeffcrume 4 ай бұрын
Con gusto!
@jeffcrume
@jeffcrume 4 ай бұрын
Muchas gracias!
@pankaj16octdogra
@pankaj16octdogra Жыл бұрын
Wow, l like video series, this is new technology Netflix
@jeffcrume
@jeffcrume Жыл бұрын
I’m so glad you like it! And you can’t beat the price! 😂
@christopherpetersen342
@christopherpetersen342 Жыл бұрын
Your example about training data isn't actually about "training" data, since the LLM is already trained and just pulling in poisoned data at run-time. Otherwise, very good stuff...
@Pettynicolla-HD-N.Ayeshamedina
@Pettynicolla-HD-N.Ayeshamedina 2 ай бұрын
Because of thier voice in community affairs, some activist groups would be considered influential members of the community. It is not always those individuals in “official positions of leadership.” For example, the President of the local Parent Teacher Association (PTA) may be important, but the real power behind decisions about education nay be a former school board member or a highly respected principal. When these people talk, others are careful to listen. Research for community relations, then, consists of investigation of the client, the reason for the program, and the target audiences in the community. How to contact U.S. Naval Institute Proceedings 134(1) (January 2008): 88. Conference Papers-International Studies Association (2007): 1. Poston, Patty. “Grassroots Communications Reconsidered,” Public Relations Tactics 9 (September 2002)): 12-13. Wiser, Nancy. “After the storm: PR effort help quell public frustration in Kentucky,” Public Relations Tactics 11 (January 2004): 11-12.
@bobanmilisavljevic420
@bobanmilisavljevic420 Жыл бұрын
🔥
@bastabey2652
@bastabey2652 Жыл бұрын
"LLM is NOT a trusted user"... ouch
How to Secure AI Business Models
13:13
IBM Technology
Рет қаралды 35 М.
What Is a Prompt Injection Attack?
10:57
IBM Technology
Рет қаралды 214 М.
Vampire SUCKS Human Energy 🧛🏻‍♂️🪫 (ft. @StevenHe )
0:34
Alan Chikin Chow
Рет қаралды 138 МЛН
OWASP Top 10 in 10 Min! (Kinda)
18:44
NahamSec
Рет қаралды 32 М.
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 209 М.
The 2025 OWASP Top 10 for LLMs
33:01
TrojAI
Рет қаралды 102
Real-world exploits and mitigations in LLM applications (37c3)
42:35
Embrace The Red
Рет қаралды 25 М.
[1hr Talk] Intro to Large Language Models
59:48
Andrej Karpathy
Рет қаралды 2,4 МЛН
Transformers (how LLMs work) explained visually | DL5
27:14
3Blue1Brown
Рет қаралды 4,5 МЛН
OWASP Top 10 2021 - The List and How You Should Use It
8:51
Cyber Citadel
Рет қаралды 95 М.
Why Large Language Models Hallucinate
9:38
IBM Technology
Рет қаралды 221 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34