Securing AI systems without overconfidence or fear – Part 2: Attack surfaces and the checkpoint flow
The RAG bot, with checkpoints Let’s circle back to the team from our introduction. With the three checkpoints in place, the same attack would have been intercepted three different ways: Three layers, three different ways to catch the same attack. That is what defense in depth means in this stack: not a single perfect filter,…
