We use cookies to personalize content and to analyze our traffic. Please decide if you are willing to accept cookies from our website.

Articles by Tag: LLM

EU Regulations, Technologies, AI Realities and Cyber Risks: 2024 Tech Insights

EU Regulations, Technologies, AI Realities and Cyber Risks: 2024 Tech Insights

2024 saw significant shifts in technology, with the EU's AI Act and DMA impacting businesses alongside the rise of modular laptops and the persistent threat of cyber attacks. This review highlights some of the developments that interested IT leaders. This list suggests CIOs and IT executives should continue to prioritise compliance, evaluate new technologies, and strengthen cybersecurity in 2025.
Navigate the Technology Trends of 2025 – Compliance

Navigate the Technology Trends of 2025 – Compliance

From the EU AI Act to emerging state-level AI laws in the US, 2025 promises heightened scrutiny and demands on IT systems. Organizations must adopt forward-thinking strategies, leveraging emerging technologies like LLMs and governance tools, to navigate this terrain effectively. CIOs should prioritise proactive compliance measures to safeguard operations and maintain competitive advantage.
Four Key Strategies to Mitigate AI Supply Chain Risks from Large Language Models

Four Key Strategies to Mitigate AI Supply Chain Risks from Large Language Models

The rapid integration of large language models (LLMs) into AI applications brings significant benefits but also introduces several supply chain risks. Developers and security experts using LLMs must understand AI supply chain risks and know how to mitigate them effectively.
Locking down LLMs to Combat Jailbreaks

Locking down LLMs to Combat Jailbreaks

LLM jail-breaking (also known as LLM manipulation) forces LLMs to exhibit unwanted behavior. These LLMs may become examples of irresponsible and unethical AI, depending on what they are forced to do. Cybersecurity teams can ensure that their LLMs are responsible and ethical through resilience testing for jailbreaks and implementing multiple guardrails to combat jailbreaks.