Cracking The Security Interview
Subscribe
Sign in
Home
📚 Security Concepts
❓ Interview Questions
🤖 AI + Security
Archive
About
LLM Agents, The Confused Deputy
Using AI agents to inadvertently exfiltrate private data
Jun 11
•
Akash Mukherjee
5
Share this post
LLM Agents, The Confused Deputy
read.crackingthesecurityinterview.com
Copy link
Facebook
Email
Note
Other
Security of LLM Agents
A three part series of assessing challenges in deploying LLM agents in enterprises
Jun 4
•
Akash Mukherjee
12
Share this post
Security of LLM Agents
read.crackingthesecurityinterview.com
Copy link
Facebook
Email
Note
Other
May 2024
Cryptography
The art and science behind security principles
May 28
•
Akash Mukherjee
3
Share this post
Cryptography
read.crackingthesecurityinterview.com
Copy link
Facebook
Email
Note
Other
Encryption
Part 1: One stop solution for many security problems
May 21
•
Akash Mukherjee
7
Share this post
Encryption
read.crackingthesecurityinterview.com
Copy link
Facebook
Email
Note
Other
2
IAAA: Access Management Explained
4 security controls to secure any system
May 14
•
Akash Mukherjee
8
Share this post
IAAA: Access Management Explained
read.crackingthesecurityinterview.com
Copy link
Facebook
Email
Note
Other
The CIA Triad Explained
3 pillars of security that can help you solve any security question
May 7
•
Akash Mukherjee
5
Share this post
The CIA Triad Explained
read.crackingthesecurityinterview.com
Copy link
Facebook
Email
Note
Other
Welcome to Cracking The Security Interview
Get hired in the best security teams with weekly actionable tips
May 3
•
Akash Mukherjee
2
Share this post
Welcome to Cracking The Security Interview
read.crackingthesecurityinterview.com
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts