Cracking The Security Interview
Subscribe
Sign in
Home
📚 Security Concepts
❓ Interview Questions
🤖 AI + Security
Archive
About
Welcome to Cracking The Security Interview
Get hired in the best security teams with weekly actionable tips
May 3
•
Akash Mukherjee
2
Share this post
Cracking The Security Interview
Welcome to Cracking The Security Interview
Copy link
Facebook
Email
Notes
More
LLM Agents, The Confused Deputy
Using AI agents to inadvertently exfiltrate private data
Jun 11
•
Akash Mukherjee
5
Share this post
Cracking The Security Interview
LLM Agents, The Confused Deputy
Copy link
Facebook
Email
Notes
More
Security of LLM Agents
A three part series of assessing challenges in deploying LLM agents in enterprises
Jun 4
•
Akash Mukherjee
12
Share this post
Cracking The Security Interview
Security of LLM Agents
Copy link
Facebook
Email
Notes
More
Most Popular
View all
Security of LLM Agents
Jun 4
•
Akash Mukherjee
12
Share this post
Cracking The Security Interview
Security of LLM Agents
Copy link
Facebook
Email
Notes
More
IAAA: Access Management Explained
May 14
•
Akash Mukherjee
8
Share this post
Cracking The Security Interview
IAAA: Access Management Explained
Copy link
Facebook
Email
Notes
More
Encryption
May 21
•
Akash Mukherjee
7
Share this post
Cracking The Security Interview
Encryption
Copy link
Facebook
Email
Notes
More
2
LLM Agents, The Confused Deputy
Jun 11
•
Akash Mukherjee
5
Share this post
Cracking The Security Interview
LLM Agents, The Confused Deputy
Copy link
Facebook
Email
Notes
More
The CIA Triad Explained
May 7
•
Akash Mukherjee
5
Share this post
Cracking The Security Interview
The CIA Triad Explained
Copy link
Facebook
Email
Notes
More
Cryptography
May 28
•
Akash Mukherjee
3
Share this post
Cracking The Security Interview
Cryptography
Copy link
Facebook
Email
Notes
More
Not subscribed yet? Do that now and never miss an update. This publication is free.
Subscribe
Recent posts
View all
Cryptography
The art and science behind security principles
May 28
•
Akash Mukherjee
3
Share this post
Cracking The Security Interview
Cryptography
Copy link
Facebook
Email
Notes
More
Encryption
Part 1: One stop solution for many security problems
May 21
•
Akash Mukherjee
7
Share this post
Cracking The Security Interview
Encryption
Copy link
Facebook
Email
Notes
More
2
IAAA: Access Management Explained
4 security controls to secure any system
May 14
•
Akash Mukherjee
8
Share this post
Cracking The Security Interview
IAAA: Access Management Explained
Copy link
Facebook
Email
Notes
More
The CIA Triad Explained
3 pillars of security that can help you solve any security question
May 7
•
Akash Mukherjee
5
Share this post
Cracking The Security Interview
The CIA Triad Explained
Copy link
Facebook
Email
Notes
More
See all
Share this publication
read.crackingthesecurityinterview.com
Cracking The Security Interview
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts