Brent Huston
banner
lbhuston.bsky.social
Brent Huston
@lbhuston.bsky.social
54 followers 60 following 300 posts
Entrepreneur, Infosec, Partial Expat, Analytics, NLP, Rapid Skills Acquisition, Machine-Assisted Learning, Code, Data Play, Cyber-Crime, Researcher & More…
Posts Media Videos Starter Packs
Decision governance & kill review cycles: schedule quarterly “kill / pivot reviews” where chosen bets are reassessed relative to alternatives.

Read more 👉 https://lttr.ai/AkIBc

#investing #methodology #frameworks
Training data poisoning: attackers insert malicious or corrupted data into the training set so that the model learns undesirable associations or backdoors. Read more �‘‰ https://lttr.ai/AkGMa #Security #Infosec #Ai
lttr.ai
Critical Zero Trust Implementation Blunders Companies Must Avoid Now �¸ https://lttr.ai/AkDwk #Security #Infosec #GeneralInfoSec
Map your security controls to frameworks such as ISA/IEC 62443, NIST SP 800‑82, and relevant national ICS/OT guidelines.

Read more 👉 https://lttr.ai/AkDsb

#Security #Infosec #OT
How to Hack Your Daily Tech Workflow with AI Agents �¸ https://lttr.ai/AkDE8 #ai #productivity #howto
When you make something public—your ideas, your interests, your perspective—you draw attention to yourself

Read more 👉 https://lttr.ai/AkDBp

#careeradvice #career #resume
My days are structured around a concept I call the “Minimum Viable Day.” It's about identifying the essential tasks that, if accomplished, make the day successful.

Read more 👉 https://lttr.ai/AkBEq

#systemsthinking #Productivity #MakeLifeEasier
Educate data scientists in adversarial ML, model risks, privacy constraints. Read more �‘‰ https://lttr.ai/Aj8EV #Security #Infosec #Ai
Kevin Kelly wrote about the concept of 100 True Fans, and I think that framework applies here, too Read more �Ÿ‘‰ https://lttr.ai/Aj7mb #careeradvice #career #resume
The more consistently I created public work—writings, talks, podcasts, code, experiments—the more serendipity showed up.

Read more 👉 https://lttr.ai/Aj7fP

#careeradvice #career #resume
Renovating a home is like upgrading a piece of software — it starts with ambition, hits some bugs along the way, and ends with a mixture of pride and “what were we thinking

Read more 👉 https://lttr.ai/Aj5u2

#renovation #kitchen #bathroom
Logic Tampering via Protocol AbuseAn attacker intercepts commands over EtherNet/IP and alters setpoints on a pressure sensor—causing shock pressure and damaging equipment before operators notice.

Read more 👉 https://lttr.ai/Aj3jg

#Security #Infosec #OT
lttr.ai
Investing in Ambiguity: A Portfolio Framework from AGI to Climate Hardware �¸ https://lttr.ai/Aj2u1 #investing #methodology #frameworks
Securing AI / Generative AI Use in the Enterprise: Risks, Gaps & Governance: https://lttr.ai/Aj1BS

#Security #Infosec #Ai
lttr.ai
We call it an Alert-Quality SLO (AQ-SLO) and it can reclaim 20–40% of analyst time for higher-value work like hunts, tuning, and purple-team exercises.

Read more 👉 https://lttr.ai/Aj05P

#Security #Infosec #Ai
lttr.ai
Personal AI Security: How to Use AI to Safeguard Yourself — Not Just Exploit You
▸ https://lttr.ai/Aj0Z2

#ai #security #infosec
Users and communities establish rules through smart contracts and incentive structures, punishing malicious behavior and rewarding cooperation. Read more �‘‰ https://lttr.ai/Aj0Za #ai #futurism #abundance
No implicit trust anywhere—every login, device and data request is re-authenticated or cryptographically protected34.

Read more 👉 https://lttr.ai/AjzBE

#Privacy #PeronalPrivacy #KeyTakeaway
Cut SOC Noise with an Alert-Quality SLO: A Practical Playbook for Security Teams �¸ https://lttr.ai/AjyRH #Security #Infosec #Ai
New detectors (rules, models, enrichments) must pass a 7-day shadow-mode trial demonstrating NAAH ≤ 3 or ≥ 30% precision uplift with no P90 MTTT regressions.

Read more 👉 https://lttr.ai/Ajx31

#Security #Infosec #Ai
It’s harder to attack everyone’s devices than it is to breach a single hyperscale database.

Read more 👉 https://lttr.ai/AjxtF

#ai #futurism #abundance
Embedding controls across a mesh of devices, coordinated by consensus and smart contracts, creates resilience that a single central gatekeeper can never achieve. Read more �‘‰ https://lttr.ai/Ajxkl #ai #futurism #abundance
Strong control over third-party remote access is essential—no direct device access unless brokered and constrained.

Read more 👉 https://lttr.ai/Ajs4x

#Security #Infosec #OT
This is consistent with how deep biotech bets behave in real funds: huge upside but long tail and binary risk dominates. Read the full article: Investing in Ambiguity: A Portfolio Framework from AGI to Climate Hardware �¸ https://lttr.ai/AjsZd #investing #methodology #frameworks
Whether it’s a futuristic habit stack, an AI tool tryout, or a scenario exercise, share your experiment.

Read more 👉 https://lttr.ai/AjsOj

#futurism #selfimprovement