Cookie Preferences

We use cookies to provide the basic functionalities of the website and to enhance your online experience. You can choose your preference below. For more details, please read the full privacy policy

Necessary cookies
These cookies are essential for the proper functioning of the website. Without these cookies, the website would not work properly.
Optional cookies
These help us improve the experience for our users by helping make better product by learning more deeply how users interact with our website.
For any queries in relation to our policy on cookies and your choices, please email security@simbian.ai.
Icon
Featured Articles
LLM
Using Structured Outputs to Chain LLM Pipelines

Discover how structured outputs can enhance the LLM pipeline chaining, maximizing the accuracy and performance of AI. Discover how this strategy improves productivity and guarantees trustworthy outcomes for AI-driven cybersecurity solutions.

Author's avatar
John Tan Chong
September 05, 2024
Security
Generative AI in Cybersecurity: Co-Pilots vs. Agents

Explore the differences between generative AI Co-Pilots and Agents in cybersecurity, emphasizing their unique roles in enhancing decision-making and automating routine tasks to optimize cybersecurity operations.

Author's avatar
Jason Keirstead
August 27, 2024
Security
Generative AI in Security: Accelerant? Or Also A Paradigm Shifter

Generative AI is already making security more efficient. Should we use this opportunity to reimagine how we do security rather than just doing more of the same?

Author's avatar
Jason Keirstead
August 06, 2024
Security
Guest Essay: CrowdStrike Outage Fallout

What does the recent CrowdStrike outage tell us about the state of digital resiliency? Businesses need to ramp up their resiliency.

Author's avatar
Sumedh Barde
July 31, 2024
LLM
Getting GPT-4 To Count ā€˜Rā€™ in Strawberry

Why does ChatGPT fail to count the number of Rā€™s in strawberry? More to it than meets the eye?

Author's avatar
John-Tan-Chong
June 5, 2024
Security
Introducing Simbian and Fully Autonomous Security

Harness the power of Gen AI to craft tailored insights and workflows for your unique security needs.

Author's avatar
Ambuj Kumar
April 11, 2024