L. Brent Huston (@lbhuston) 's Twitter Profile
L. Brent Huston

@lbhuston

Entrepreneur, Infosec, Partial Expat, Analytics, NLP, Rapid Skills Acquisition, Machine-Assisted Learning, Code, Data Play, Cyber-Crime, Researcher & More…

ID: 15263926

linkhttps://bookme.name/bhuston calendar_today28-06-2008 15:56:41

28,28K Tweet

2,2K Followers

2,2K Following

L. Brent Huston (@lbhuston) 's Twitter Profile Photo

The WWII summary prompt (Prompt #2) dominates in volume but is deeply flawed: Numerous fabricated battles and dates (Stalingrad in the 1980s/1990s, fake generals, repetition of Midway). Read more 👉 lttr.ai/AiMHp #ai #genai

The WWII summary prompt (Prompt #2) dominates in volume but is deeply flawed:   Numerous fabricated battles and dates (Stalingrad in the 1980s/1990s, fake generals, repetition of Midway).

Read more 👉 lttr.ai/AiMHp

#ai #genai
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

A great test for overpacking is to ask: “If I had to live out of this bag for two weeks, would it work?” Read more 👉 lttr.ai/AiQfD #travel #EfficientTravelPacking #travelpackinghacks

A great test for overpacking is to ask: “If I had to live out of this bag for two weeks, would it work?”

Read more 👉 lttr.ai/AiQfD

#travel #EfficientTravelPacking #travelpackinghacks
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

Regulatory requirements and industry standards have increasingly emphasized the importance of robust incident response, disaster recovery, and business continuity plans. Read more 👉 lttr.ai/AiQ6U #Security #Infosec #Compliance

L. Brent Huston (@lbhuston) 's Twitter Profile Photo

“Consulting crash” looming — AI efficiencies combined with contracting policy changes are straining consulting profitability across the board. Read more 👉 lttr.ai/AiRpd #consulting #ai #genai

L. Brent Huston (@lbhuston) 's Twitter Profile Photo

Cybersecurity teams are wasting time, money, and effort dealing with tool sprawl and ‘multi-vendor ecosystems' – IT Pro Read more 👉 lttr.ai/AiSTw #Security #Infosec #Alerts

Cybersecurity teams are wasting time, money, and effort dealing with tool sprawl and ‘multi-vendor ecosystems' – IT Pro

Read more 👉 lttr.ai/AiSTw

#Security #Infosec #Alerts
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

"Moreover, accurate data mapping contributes to business intelligence by revealing redundant data sources and enhancing the reliability of analytics results, thereby improving the overall performance of business processes." lttr.ai/AiSZR #Security #Infosec #DataFlow

"Moreover, accurate data mapping contributes to business intelligence by revealing redundant data sources and enhancing the reliability of analytics results, thereby improving the overall performance of business processes." lttr.ai/AiSZR

#Security #Infosec #DataFlow
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

Shorter prompts (e.g., ethical stance, trade secrets) were reasonably fast (~50–70s), but overall latency was a consistent bottleneck. Read more 👉 lttr.ai/AiSuh #ai #genai #llm

Shorter prompts (e.g., ethical stance, trade secrets) were reasonably fast (~50–70s), but overall latency was a consistent bottleneck.

Read more 👉 lttr.ai/AiSuh

#ai #genai #llm
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

St. Paul cyberattack: swift containment, no ransom paid[10]. Read more 👉 lttr.ai/AiTTB #Security #Infosec #EmergingThreats

St. Paul cyberattack: swift containment, no ransom paid[10].

Read more 👉 lttr.ai/AiTTB

#Security #Infosec #EmergingThreats
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

A KnowBe4 study released in August 2025 sets off alarm bells: 43 % of security incidents stem from employee distraction—while only 17 % involve sophisticated attacks. Read more 👉 lttr.ai/AiT5a #Security #Infosec #EmergingThreats

L. Brent Huston (@lbhuston) 's Twitter Profile Photo

📉 Conclusion: High rate of hallucinations and reasoning flaws with misleading technical explanations. Read more 👉 lttr.ai/AiUAa #ai #genai

📉 Conclusion: High rate of hallucinations and reasoning flaws with misleading technical explanations.

Read more 👉 lttr.ai/AiUAa

#ai #genai
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

So I’ve been unpacking the models I use—deconstruction, inversion, compounding, Pareto analysis, the entourage effect—and showing how those can be applied across cybersecurity, personal health, and even everyday life. Read more 👉 lttr.ai/AiVV8

So I’ve been unpacking the models I use—deconstruction, inversion, compounding, Pareto analysis, the entourage effect—and showing how those can be applied across cybersecurity, personal health, and even everyday life.

Read more 👉 lttr.ai/AiVV8
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

Need assistance implementing this multi-browser approach or other security controls? Read more 👉 lttr.ai/AiWWS #Security #Infosec #TakingSignificantSteps

Need assistance implementing this multi-browser approach or other security controls?

Read more 👉 lttr.ai/AiWWS

#Security #Infosec #TakingSignificantSteps
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

But after decades of leading MSI’s vCISO team and working with organizations of all sizes, I’ve come to believe that the single largest benefit of a vCISO program isn’t tactical — it’s transformational. Read more 👉 lttr.ai/AiW00 #Security #Infosec #Mentoring

But after decades of leading MSI’s vCISO team and working with organizations of all sizes, I’ve come to believe that the single largest benefit of a vCISO program isn’t tactical — it’s transformational.

Read more 👉 lttr.ai/AiW00

#Security #Infosec #Mentoring
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

By using contextual information such as user identity and device security, zero trust continuously assesses the legitimacy of access requests, thus enhancing the overall security framework. Read more 👉 lttr.ai/AiWq6 #Security #Infosec #Architecture

By using contextual information such as user identity and device security, zero trust continuously assesses the legitimacy of access requests, thus enhancing the overall security framework.

Read more 👉 lttr.ai/AiWq6

#Security #Infosec #Architecture
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

Its proprietary approach to tabletop exercises goes beyond generic templates, ensuring real value for your organization. Read more 👉 lttr.ai/AicUe #Security #Infosec #BusinessContinuity

Its proprietary approach to tabletop exercises goes beyond generic templates, ensuring real value for your organization.

Read more 👉 lttr.ai/AicUe

#Security #Infosec #BusinessContinuity
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

From drafting emails to analyzing complex data sets, AI is becoming an integral member of our teams. Read more 👉 lttr.ai/AiWz8 #ArtificialIntelligence #DailyOperations #IntegralMember

From drafting emails to analyzing complex data sets, AI is becoming an integral member of our teams.

Read more 👉 lttr.ai/AiWz8

#ArtificialIntelligence #DailyOperations #IntegralMember
L. Brent Huston (@lbhuston) 's Twitter Profile Photo

Technostress: Rapid change in tools, lack of standardization, insecurity around job skills, and constant connectivity lead to persistent strain Wikipedia. Read more 👉 lttr.ai/Aigge #Security #Infosec #Management