Manage risk at the junction of artificial intelligence and software security. Click to read Deploy Securely, by Walter Haydock, a Substack publication with thousands of subscribers.| blog.stackaware.com
How I uncovered a highly polished gray mail "vulnerability disclosure" phishing site.| Deploy Securely
How to comply with yet another AI-specific rule.| Deploy Securely
Managing risk with an ISO 42001 Artificial Intelligence Management System.| blog.stackaware.com
Enhancing StackAware customer security with continuous ethical hacking coverage.| blog.stackaware.com
A procedure for how to manage risk if your company is building "High-risk Artificial Intelligence Systems."| blog.stackaware.com
Managing compliance risk while delivering business value in the fractured American AI governance landscape.| Deploy Securely
Managing HR risk while deploying AI.| Deploy Securely
Driving customer trust and accelerating innovation at the cyber-physical juncture.| Deploy Securely
An actionable procedure for companies using AI for hiring in the Big Apple.| Deploy Securely
A joint case study reflecting on our work together.| blog.stackaware.com
Enhancing a key risk transfer option.| Deploy Securely
The Good, the Bad, and the Ugly of AI’s interface to the real world.| blog.stackaware.com
Managing risk in the face of gray area.| blog.stackaware.com
An actionable procedure for companies to deal with regulatory uncertainty while still delivering value.| blog.stackaware.com
Go beyond platitudes.| Deploy Securely
Why others suggest it's time to move on from what was the "gold standard" of B2B SaaS security due diligence.| blog.stackaware.com
Building an AI Management System for mission-critical healthcare applications.| Deploy Securely
Win big deals without signing up to do the impossible.| blog.stackaware.com
Pretending otherwise is a security risk.| blog.stackaware.com
Mitigating insecure code generation, unintended training, and more.| blog.stackaware.com
Map artificial intelligence tools throughout your supply chain.| blog.stackaware.com
Clarifying data security concerns with 3rd party AI models.| blog.stackaware.com