Modeling in Polar| www.osohq.com
Authorization in LLM Applications| www.osohq.com
Phishing scams are among the most common and dangerous type of attack that organisations face. But what makes these attacks so successful?| IT Governance Blog
Ship secure, permissions-aware RAG apps with Oso. Define access rules once, apply them to SQLAlchemy queries, and filter embeddings in pgvector automatically.| www.osohq.com
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.| owasp.org