Home
Why Read this Guide?
This guide shows how cybersecurity professionals can get up and running quickly with AI tools to:
- augment your skills and amplify your impact
- reduce your toil
Large Language Models (hosted and open source), and BERT-based language models tools will be covered e.g.
- NotebookLM
- Prompts and Prompt Techniques applied to Cybersecurity
- BERTopic
- Embeddings for CyberSecurity
- AI Agents for orchestrated workflows
Risk Based Prioritization Guide
Check out another guide I co-wrote with various thought leaders in vulnerability management https://riskbasedprioritization.github.io/
The Risk Based Prioritization described in this guide significantly reduces the
- cost of vulnerability management
- risk by reducing the time adversaries have access to vulnerable systems they are trying to exploit.