Forem

Mike Anderson profile picture

Mike Anderson

Cybersecurity professional writing on cloud defense, SOC operations, WAF/AppSec, AI-enabled security, and real-world lessons from protecting modern production systems.

Location Thailand Joined Joined on 
Building a Secure AI Agent Harness for a Bank: From Architecture to Working Code

Building a Secure AI Agent Harness for a Bank: From Architecture to Working Code

Comments
15 min read

Want to connect with Mike Anderson?

Create an account to connect with Mike Anderson. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Securing AI Agents in a Bank: From Daily ChatGPT Use to a Production-Ready Secure Harness

Securing AI Agents in a Bank: From Daily ChatGPT Use to a Production-Ready Secure Harness

Comments
18 min read
Controlling Employee AI Usage on Managed Devices: Browser Controls, Cloudflare AI Gateway, and AWS Bedrock

Controlling Employee AI Usage on Managed Devices: Browser Controls, Cloudflare AI Gateway, and AWS Bedrock

2
Comments
17 min read
Securing AI Assistants and AI Agents: A Practical Guide for Cybersecurity, DevOps, and Engineering Teams

Securing AI Assistants and AI Agents: A Practical Guide for Cybersecurity, DevOps, and Engineering Teams

Comments
11 min read
Agent Loop and Harness: A Practical Engineering View of AI Operations

Agent Loop and Harness: A Practical Engineering View of AI Operations

Comments
13 min read
Controlling External AI Safely: Where CASB Fits for Mac, Remote, and Office Users

Controlling External AI Safely: Where CASB Fits for Mac, Remote, and Office Users

2
Comments
13 min read
How CASB Helps Control External AI Platforms Without Killing Innovation

How CASB Helps Control External AI Platforms Without Killing Innovation

Comments
12 min read
Building a Safe Internal AI Assistant with Amazon Kendra and Amazon Bedrock

Building a Safe Internal AI Assistant with Amazon Kendra and Amazon Bedrock

Comments
16 min read
GPUs, Data Security, and the AI Performance Race: Running Powerful Models Without Losing Control of Your Data

GPUs, Data Security, and the AI Performance Race: Running Powerful Models Without Losing Control of Your Data

Comments
13 min read
Automating AWS Security Hub Prioritization with Amazon Bedrock and Claude Sonnet 4.6

Automating AWS Security Hub Prioritization with Amazon Bedrock and Claude Sonnet 4.6

Comments
8 min read
From Idea to Image: A Practical Midjourney Prompting Guide

From Idea to Image: A Practical Midjourney Prompting Guide

Comments
15 min read
Digital Signatures: The “Trust Me Bro” Detector for Junior Cybersecurity Engineers

Digital Signatures: The “Trust Me Bro” Detector for Junior Cybersecurity Engineers

Comments
7 min read
Running Qwen3.6-27B on a 16GB M1 MacBook Pro: A Practical Engineer’s Guide

Running Qwen3.6-27B on a 16GB M1 MacBook Pro: A Practical Engineer’s Guide

Comments
7 min read
Running Qwen3.6-27B on a 16GB M1 MacBook Pro: A Practical Engineer’s Guide

Running Qwen3.6-27B on a 16GB M1 MacBook Pro: A Practical Engineer’s Guide

Comments
7 min read
A Practical Terraform Security Review with Codex and Claude Code

A Practical Terraform Security Review with Codex and Claude Code

Comments
14 min read
Using Codex in ChatGPT: A Practical Guide for Cybersecurity Engineers

Using Codex in ChatGPT: A Practical Guide for Cybersecurity Engineers

Comments
11 min read
What Are Tokens and Temperature in AI Models?

What Are Tokens and Temperature in AI Models?

Comments
12 min read
Choosing the Right Local AI Stack for SOC Alert Triage: Model, Engine, and Harness

Choosing the Right Local AI Stack for SOC Alert Triage: Model, Engine, and Harness

Comments
17 min read
Stop Using ChatGPT Like a Search Box: Build Better Prompts, Projects, and Custom GPTs

Stop Using ChatGPT Like a Search Box: Build Better Prompts, Projects, and Custom GPTs

3
Comments 3
8 min read
loading...