
The Developer’s Guide to LLM Security
The Data Exchange with Ben Lorica
00:00
Why LLM security differs from traditional software
Steve Wilson explains prompt injection, phishing-like attacks, and new stakes from democratized AI tools.
Play episode from 00:44
Transcript


