<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>GTK Cyber Blog</title><description>Insights on AI, data science, and cybersecurity from the GTK Cyber team.</description><link>https://gtkcyber.com/</link><item><title>AI Red-Teaming for Beginners: Where to Start and What to Test</title><link>https://gtkcyber.com/blog/ai-red-teaming-tips-for-beginners/</link><guid isPermaLink="true">https://gtkcyber.com/blog/ai-red-teaming-tips-for-beginners/</guid><description>A practical guide to AI red-teaming for security professionals. Set up a local LLM lab, test for prompt injection, and document findings systematically.</description><pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate><category>AI red-teaming</category><category>LLM security</category><category>adversarial AI</category><category>prompt injection</category><category>red team</category><author>Charles Givre</author></item><item><title>Welcome to GTK Cyber</title><link>https://gtkcyber.com/blog/welcome/</link><guid isPermaLink="true">https://gtkcyber.com/blog/welcome/</guid><description>GTK Cyber trains cybersecurity professionals in AI, data science, and machine learning.</description><pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate><category>announcement</category><author>Charles Givre</author></item><item><title>Why Cybersecurity Professionals Need AI Skills in 2026</title><link>https://gtkcyber.com/blog/why-cybersecurity-professionals-need-ai-skills/</link><guid isPermaLink="true">https://gtkcyber.com/blog/why-cybersecurity-professionals-need-ai-skills/</guid><description>AI is reshaping every part of the security landscape, offense and defense alike. Here&apos;s why building AI skills is no longer optional for security practitioners.</description><pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate><category>AI</category><category>cybersecurity</category><category>skills</category><category>machine learning</category><author>Charles Givre</author></item><item><title>What Is AI Red-Teaming? A Practical Introduction for Security Professionals</title><link>https://gtkcyber.com/blog/what-is-ai-red-teaming/</link><guid isPermaLink="true">https://gtkcyber.com/blog/what-is-ai-red-teaming/</guid><description>AI red-teaming is the adversarial testing of AI systems, finding how they break before attackers do. Here&apos;s what it involves and why security professionals need to understand it.</description><pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate><category>AI red-teaming</category><category>LLM security</category><category>adversarial AI</category><category>red team</category><author>Charles Givre</author></item><item><title>How to Evaluate AI Security Vendors Without Getting Fooled</title><link>https://gtkcyber.com/blog/evaluating-ai-security-vendors/</link><guid isPermaLink="true">https://gtkcyber.com/blog/evaluating-ai-security-vendors/</guid><description>Every security vendor has an AI story now. Here&apos;s a practical framework for cutting through the marketing and evaluating what AI security tools actually do.</description><pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate><category>AI</category><category>vendor evaluation</category><category>CISO</category><category>security operations</category><author>Charles Givre</author></item><item><title>Automated Advanced Analytics: An Unexpected Tool in the Cyber Arsenal</title><link>https://gtkcyber.com/blog/automated-analytics-cybersecurity/</link><guid isPermaLink="true">https://gtkcyber.com/blog/automated-analytics-cybersecurity/</guid><description>Security teams generate massive amounts of data. Automated analytics can help separate real threats from noise and detect attacks earlier.</description><pubDate>Wed, 09 Jun 2021 00:00:00 GMT</pubDate><category>data science</category><category>analytics</category><category>cybersecurity</category><category>Apache Drill</category><category>automation</category><author>Josh Friedman</author></item><item><title>The Power of Prediction: Machine Learning for Ransomware Prevention</title><link>https://gtkcyber.com/blog/machine-learning-ransomware-prevention/</link><guid isPermaLink="true">https://gtkcyber.com/blog/machine-learning-ransomware-prevention/</guid><description>Machine learning can detect ransomware activity before encryption begins by identifying anomalies in system behavior. Here is how it works.</description><pubDate>Wed, 09 Jun 2021 00:00:00 GMT</pubDate><category>machine learning</category><category>ransomware</category><category>threat detection</category><category>anomaly detection</category><author>Josh Friedman</author></item></channel></rss>