Jo Peterson's Avatar

Jo Peterson

@cleartech.bsky.social

Engineer who helps clients scope, source and vet solutions in #Cloud #cloudsecurity #aisecurity| #ai|Tech analyst| VP Cloud and Security|USAF vet| ๐Ÿ“šLearning from CIOs and CISOs on the daily| ๐Ÿ’• of NY Times Spelling ๐Ÿ Linked In: LinkedIn.com|in|JoPeterson1

834 Followers  |  1,839 Following  |  98 Posts  |  Joined: 03.12.2024  |  1.8584

Latest posts by cleartech.bsky.social on Bluesky

Video thumbnail

๐Ÿ“Œ Q: What does โ€œprecisionโ€ refer to in AI?

A: In AI, "precision" refers to a metric that measures how many of a model's positive predictions are actually correct

V/ VISO

#ai #aisecurity

27.02.2025 11:43 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is prompt injection in Agentic AI?

A: In agentic AI, "prompt injection" refers to a security vulnerability where a malicious user manipulates the input prompt given to an AI system, essentially "injecting" harmful instructions to trick AI

v/ Cisco.bsky.social
#aisecurity #agenticai

21.02.2025 12:21 โ€” ๐Ÿ‘ 4    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: How can data cleaning boost AI model accuracy?

A: Data cleaning is crucial in AI because the quality of data directly impacts the accuracy and reliability of AI models

#datacleaning #ai

20.02.2025 12:41 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: Can Large Language Models (LLMs) alter data?

A: Yes, LLMs (Large Language Models) can indirectly alter data by generating new information or modifying existing data based on the prompts and context provided.

v/ @nexla.bsky.social

#aisecurity #ai

19.02.2025 12:04 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: How do you restrict access to Large Language Models (LLMs)?

A: To restrict access to LLMs, implement access controls like (RBAC), multi-factor authentication (MFA), and user authentication systems, limiting who can interact with LLM

v/ Exabeam.bsky.social

#aisecurity #cloudai #cyberai

18.02.2025 11:56 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: Can #AI models get stuck?

A: Yes, AI models can essentially get "stuck" in a state where they repeatedly generate similar outputs or fail to learn effectively

v/ Infobip

#cloud #cloudsecurity #cloudai #aisecurity

14.02.2025 11:44 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: How do you secure private AI?

A: To secure private AI, you need:

โœ…strict access controls
โœ…data encryption
โœ…model watermarking
โœ…secure network infrastructure
โœ…data anonymization,
โœ…robust privacy policies,
โœ…regular security audits

v/ Surgere

#cloud #cloudsecurity #cloudai #aisecurity

13.02.2025 12:04 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is a false positive in AI?

A: A "false positive" in AI refers to when an AI system incorrectly identifies something as belonging to a specific category, like flagging human-written text as AI-generated

v/ Originality.ai

#cloud #cloudsecurity #cybersecurity #aisecurity

12.02.2025 12:42 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Sign-up for the AskWoody Newsletter and read Deanna's latest article: "Back to BASICs โ€” Hello, World! " A look at the favorite BASIC programming language versions.
www.askwoody.com/2025/back-to...

#programming #Learntocode #Computing @AskWoody

10.02.2025 15:19 โ€” ๐Ÿ‘ 5    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1
Video thumbnail

๐Ÿ“Œ Q: What is an AI ๐Ÿค– privacy issue?

A: An AI privacy issue refers to the potential for artificial intelligence systems to violate personal privacy by collecting, storing, and analyzing personal data without user knowledge, consent, or control

v/ IBM

#cloud #cloudsecurity #cloudai #aisecurity

11.02.2025 12:10 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is over privilege in an AI ๐Ÿค– system?

A: โ€œOver privilege" in an AI system refers to a situation where an AI model or component has been granted excessive access to data or functionalities

v/ @oneidentity.bsky.social

#cloud #cloudsecurity #cloudai #aisecurity

10.02.2025 10:59 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: How does agentic AI handle inputs?

A: Agentic AI handles inputs by autonomously processing information from various sources, including environmental data, user interactions, and internal knowledge bases

v/ @ibm.bsky.social

#cloud #cloudsecurity #cloudai #aisecurity

07.02.2025 13:12 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What are common data leak vulnerabilities in LLMs?

A:
โœ… Incomplete or improper filtering of sensitive information

โœ… Overfitting or memorization of sensitive data

โœ… Unintended disclosure of confidential information

v/ OWASPยฎ Foundation

#cloud #cloudsecurity #cloudai #aisecurity

06.02.2025 12:03 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: Whatโ€™s the difference between public and private AI?

A: Public AI operates on hyperscale cloud-based platforms and is accessible to multiple businesses

Private AI is tailored and confined to a specific organisation.

v/ ComputerWeekly.bsky.social

#cloud #cloudsecurity #cloudai #aisecurity

05.02.2025 10:58 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
40 LinkedIn Top Voices in Tech for 2025 | Engati Exclusive list of 40 LinkedIn top voices in Technology for you to stay updated with all the upcoming trends, news, and resources related to technology

๐Ÿ“Œ Thank you Engati for naming me to 40 LinkedIn Top Voices in Tech for 2025

Itโ€™s an honor and Iโ€™m in amazing company

Read: ๐Ÿ“š www.engati.com/blog/linkedi...

#cloud #cloudsecurity #cloudai #aisecurity

05.02.2025 08:56 โ€” ๐Ÿ‘ 4    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is a walled garden approach in AI?

A: A "walled garden" approach in AI refers to a closed ecosystem where a single entity controls all aspects of an AI system

v/ Iterate.ai

#cloud #cloudsecurity #cloudai #aisecurity

04.02.2025 12:12 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is an unknown threat in AI security?

A: An "unknown threat" in AI security refers to a cyber threat that hasn't been previously identified or documented, meaning it lacks a known signature

v/ @zscaler.bsky.social

#cloud #cloudsecurity #aisecurity

03.02.2025 13:23 โ€” ๐Ÿ‘ 3    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
The Growth of Platform-as-a-Service (PaaS) According to Flexeraโ€™s 2024 State of the Cloud Report, Platform-as-a-Service took off in 2024 and weโ€™re not seeing any slowing down of this trend in 2025. If youโ€™re not already exploring the value of ...

๐Ÿ“Œ BrightTALK 's Cloud Cover has hit the 9K follower mark!

Interested in knowing where the Platform as a Service (PaaS) space is headed?

When: 2/12

Time: 12PM EST

๐Ÿ‘‰ Register here: www.brighttalk.com/webcast/1998...

๐Ÿ›Ž๏ธ Subscribe: www.brighttalk.com/channel/19985

#cloud #cloudsecurity #aisecurity

30.01.2025 16:23 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is AI model collapse?

A: AI model collapse is a process where generative AI models trained on AI-generated data begin to perform poorly.

v/ @appinventiv.bsky.social

#cloud #cloudsecurity #cybersecurity #aisecurity

30.01.2025 13:19 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is Adaptive authentication in AI security?

A: Adaptive authentication in AI security is a dynamic authentication method that uses machine learning and contextual data to assess the risk of a login attempt

v/ OneLogin by One Identity

#cloud #cloudsecurity #cloudai #aisecurity

29.01.2025 11:32 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

๐Ÿ“Œ Q: What is adversarial machine learning?

A: Adversarial machine learning (AML) is a technique that uses malicious inputs to trick or mislead a machine learning (ML) model.

v/ @crowdstrike.bsky.social

#cloud #cloudsecurity #cybersecurity #cloudai

28.01.2025 12:18 โ€” ๐Ÿ‘ 6    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Thank you ๐Ÿ˜Š

27.01.2025 15:55 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ’กHappy to announce that Iโ€™ve been invited to participate in the AI Safety Executive Leadership Council for the Cloud Security Alliance
#cloud #cloudsecurity #cloudai #cybersecurity #aisecurity

27.01.2025 15:35 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: How often should you refresh your cybersecurity policy?

A: A cybersecurity policy should be refreshed at least once a year

v/ @carbide.bsky.social

#cloud #cloudsecurity #cybersecurity #cloudai #aisecurity

27.01.2025 11:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is an insider threat in AI security?

A: An "insider threat" in AI security refers to a situation where someone with authorized access to an organization's AI systems misuses that access to harm the organization

v/@vectraai.bsky.social

#cloud #cloudsecurity #cloudai #aisecurity

24.01.2025 13:44 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ“Œ Get up to speed with CMMC--Join us for a Webinar--January 28th, 1PM EST

As a IT or Security leader, will your business be impacted by the new CMMC rules?

Join Trustwave and Clarify360 for a webinar

When: 01/28/2025
Time: 1PM EST

๐Ÿ‘‰ Register here: www.eventbrite.com/e/accelerate...

23.01.2025 14:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is confabulation on the part of a Large Language Model (LLM)?

A: Confabulation on the part of a Large Language Model (LLM) is the generation of output that is not based on real-world input or information

v/@owasp.bsky.social

#cloud #cloudsecurity #cloudai #cyberai #ai

23.01.2025 12:18 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What are backdoor attacks?

A: Backdoor attacks are a type of cybersecurity threat that involves creating a hidden entry point into a system or network that can be exploited by an attacker to gain unauthorized access.

v/ @nightfallai.bsky.social

#cloud #cloudsecurity #cloudai #ai

22.01.2025 13:56 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

๐Ÿ“Œ Guess what y'all? Dan Sรถdergren has included a quote from me in his upcoming book--How to โ€œSurvive and Thriveโ€ In 2025. A Leaderโ€™s Guide to the Times of AI

Sign up for waitlist = Free Book!

โœ… Click here--https://www.aileadershipcourse.com/

#ai #aisecurity #aiautomation #aiworkflows

21.01.2025 14:18 โ€” ๐Ÿ‘ 3    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ“Œ Q: What is model fuzzing in AI?

A: Model Fuzzing is a testing technique used to identify vulnerabilities and weaknesses in machine learning models by inputting random, unexpected, or malformed data to observe how the model responds.

v/ @appsoc

#cloud #cloudsecurity #cloudai #aisecurity

21.01.2025 11:58 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@cleartech is following 20 prominent accounts