BLOG

WiKi Security in TAS(Transform Africa Summit) 2018

WiKi Security Corporation, which participated in TAS(Transform Africa Summit) 2018, the largest ICT event in Africa, as an exhibitor, introduced information security consulting, security products and Training Center for cyber security.In particular, we participated in an official event to deliver certificates on behalf of ISO council as a result of ISO / IEC 27001 consulting service

WiKi Security in TAS(Transform Africa Summit) 2018 더 읽기"

2023-Rwanda / Participation in the CyberTech Africa Conference held in Kigali, Rwanda

The CyberTech Africa Conference is an important cybersecurity and information technology event held annually in Africa. It brings together cybersecurity experts, IT and security solution providers, government officials and policymakers, business leaders and corporate representatives, and academic researchers from across Africa to discuss the latest technologies, trends, and challenges. WikiSecurity Co. Ltd. has maintained continuous

2023-Rwanda / Participation in the CyberTech Africa Conference held in Kigali, Rwanda 더 읽기"

Q. Inquiry about the PyCaret error: “‘Simple_Imputer’ object has no attribute ‘fill_value_categorical’”

Specific inquiry details. I was introduced to AutoML, which is said to make it easy to build machine learning models even without deep expert knowledge of machine learning, as long as you have a strong understanding of the business domain.Among the AutoML tools, I chose PyCaret because it is considered stable and integrates well with

Q. Inquiry about the PyCaret error: “‘Simple_Imputer’ object has no attribute ‘fill_value_categorical’” 더 읽기"

Q. Security factors to consider when building a generative AI (GenAI) system in a company.

Specific inquiry details. I work in the information security team at my company and am in charge of security reviews.Our company is planning to build a generative AI (GenAI) system.Since building a GenAI system differs from building a conventional information system, I’m wondering how to approach it.Also, please tell me what risks generative AI poses.

Q. Security factors to consider when building a generative AI (GenAI) system in a company. 더 읽기"

Summary Explanation of the OWASP Top 10 for LLM Applications for Securing LLM (GenAI, Generative AI) Applications

OWASP Top 10 for LLM Application LLM01. Prompt InjectionMalicious users may manipulate the LLM (GenAI) to redefine system prompts or induce unintended actions through external inputs, leading to data leakage or social engineering attacks. LLM02. Insecure Output HandlingIf the outputs generated by the LLM (GenAI) are not properly validated, vulnerabilities such as XSS, CSRF, or

Summary Explanation of the OWASP Top 10 for LLM Applications for Securing LLM (GenAI, Generative AI) Applications 더 읽기"

Security risks and security considerations in building a Retrieval-Augmented Generation (RAG) system

Overview of RAG RAG (Retrieval-Augmented Generation) has become an essential component, alongside PEFT, in the development of GenAI (Large Language Model) systems. It is a technology designed to overcome the inherent limitations of standard LLM architectures. RAG enhances a model’s ability to provide accurate and contextually relevant answers by retrieving and referencing external documents during

Security risks and security considerations in building a Retrieval-Augmented Generation (RAG) system 더 읽기"