Securing AI systems without overconfidence or fear – Part 2: Attack surfaces and the checkpoint flow

Document information Series Securing AI systems without overconfidence or fear Part 2 of 5 Title Attack surfaces and the checkpoint flow Date May 2026 Author Hussein Bahmad (NVISO) Reading time ~13 min Version 1.0 This post aligns with the OWASP Top 10 for LLM Applications 2025, the OWASP AI Security Verification Standard (AISVS), and MITRE … Continue reading Securing AI systems without overconfidence or fear – Part 2: Attack surfaces and the checkpoint flow

Why the pentesting playbook doesn’t fit: belief, assumptions, and non-determinism

Document information Series Securing AI systems without overconfidence or fear Part 1 of 5 Title Why the pentesting playbook doesn’t fit: belief, assumptions, and non-determinism Date March 2026 Author Hussein Bahmad (NVISO) Reading time ~12 min Version 1.0 Series: Securing AI systems without overconfidence or fear Part 1/5: Why the pentesting playbook doesn’t fit: belief, … Continue reading Why the pentesting playbook doesn’t fit: belief, assumptions, and non-determinism