user

2018-RWANDA-ISO/IEC 27001 READINESS CONSULTING

Rwanda’s Telecom, KT Rwanda Networks Ltd, is a communications company with Rwanda’s only LTE communications infrastructure, they are providing wholesale provision of universal mobile broadband network built on 4G LTE technology.

2016-Philippines-NTC-Cyber Security Training

Philippines NTC  is an attached agency of the Department of Information and Communication Technology, responsible for the supervision, adjudication and control over all telecommunications services throughout the country.

2015-EU Moldova-National Cyber Security Consulting

The Ministry of Information Technology and Communication (MITC) is a central specialized public administration body which elaborates and ensures the development of the Informational Society Statute (telecommunication, post, TV and broadcasts).

WiKi Security in TAS(Transform Africa Summit) 2018

WiKi Security Corporation, which participated in TAS(Transform Africa Summit) 2018, the largest ICT event in Africa, as an exhibitor, introduced information security consulting, security products and Training Center for cyber security.In particular, we participated in an official event to deliver certificates on behalf of ISO council as a result of ISO / IEC 27001 consulting service

2023-Rwanda / Participation in the CyberTech Africa Conference held in Kigali, Rwanda

The CyberTech Africa Conference is an important cybersecurity and information technology event held annually in Africa. It brings together cybersecurity experts, IT and security solution providers, government officials and policymakers, business leaders and corporate representatives, and academic researchers from across Africa to discuss the latest technologies, trends, and challenges. WikiSecurity Co. Ltd. has maintained continuous

Summary Explanation of the OWASP Top 10 for LLM Applications for Securing LLM (GenAI, Generative AI) Applications

OWASP Top 10 for LLM Application LLM01. Prompt InjectionMalicious users may manipulate the LLM (GenAI) to redefine system prompts or induce unintended actions through external inputs, leading to data leakage or social engineering attacks. LLM02. Insecure Output HandlingIf the outputs generated by the LLM (GenAI) are not properly validated, vulnerabilities such as XSS, CSRF, or

Security risks and security considerations in building a Retrieval-Augmented Generation (RAG) system

Overview of RAG RAG (Retrieval-Augmented Generation) has become an essential component, alongside PEFT, in the development of GenAI (Large Language Model) systems. It is a technology designed to overcome the inherent limitations of standard LLM architectures. RAG enhances a model’s ability to provide accurate and contextually relevant answers by retrieving and referencing external documents during