The Data Exchange with Ben Lorica cover image

The Developer’s Guide to LLM Security

The Data Exchange with Ben Lorica

00:00

Why LLM security differs from traditional software

Steve Wilson explains prompt injection, phishing-like attacks, and new stakes from democratized AI tools.

Play episode from 00:44
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app