44:56
8
Share this post
![](https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03671f39-dd6f-4329-a8d1-e8ad36b9947d_1024x1024.png)
Edition 25: Gen AI can supercharge your AppSec program
boringappsec.substack.com
![](https://substackcdn.com/image/fetch/w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_center/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F03671f39-dd6f-4329-a8d1-e8ad36b9947d_1024x1024.png)
10
Share this post
![](https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c002a7-e023-4b25-b200-e65f76c05b80_1024x1024.jpeg)
[Guest post] Edition 24: Pentesting LLM apps 101
boringappsec.substack.com
![](https://substackcdn.com/image/fetch/w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_center/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb8c002a7-e023-4b25-b200-e65f76c05b80_1024x1024.jpeg)
13
Share this post
![](https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bde8be8-d033-438c-9181-11d20facf1de_1024x1024.png)
Edition 23: A framework to securely use LLMs in companies - Part 3: Securing ChatGPT and GitHub Copilot
boringappsec.substack.com
![](https://substackcdn.com/image/fetch/w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_center/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5bde8be8-d033-438c-9181-11d20facf1de_1024x1024.png)
5
Share this post
![](https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3cf0d3-82af-44fb-8a10-df7fd609f784_1024x1024.png)
Edition 22: A framework to securely use LLMs in companies - Part 2: Managing risk
boringappsec.substack.com
![](https://substackcdn.com/image/fetch/w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_center/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b3cf0d3-82af-44fb-8a10-df7fd609f784_1024x1024.png)
23
Share this post
![](https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88c5b0d4-df8b-4087-9404-4b49f0319565_1024x1024.png)
Edition 21: A framework to securely use LLMs in companies - Part 1: Overview of Risks
boringappsec.substack.com
![](https://substackcdn.com/image/fetch/w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_center/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88c5b0d4-df8b-4087-9404-4b49f0319565_1024x1024.png)
6
Share this post
![](https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862cd8d5-889f-4065-9657-b7d09f0af196_1024x1024.png)
Edition 20: Degrading UX to improve security hurts both UX and security
boringappsec.substack.com
![](https://substackcdn.com/image/fetch/w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_center/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F862cd8d5-889f-4065-9657-b7d09f0af196_1024x1024.png)
2
Share this post
![](https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ac58f88-f94c-4e8c-b633-956dcd1bb38c_1024x1024.png)
Edition 19: Security's eternal prioritisation problem
boringappsec.substack.com
![](https://substackcdn.com/image/fetch/w_320,h_213,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_center/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ac58f88-f94c-4e8c-b633-956dcd1bb38c_1024x1024.png)
Share this publication
Boring AppSec
boringappsec.substack.com
© 2024 Sandesh Mysore Anand
Substack is the home for great culture