Resource Library

Mastering AI Security

Deep dives, actionable guides, and research to help you navigate the complex landscape of AI governance and defense.

ISO 42001 Certification Guide

The definitive guide to the world's first AI management system standard. Learn how to prepare your organization for certification.

Read Guide

NIST AI RMF Explained

A practical playbook for implementing the NIST AI Risk Management Framework's four core functions: Govern, Map, Measure, Manage.

Read Guide

OWASP Top 10 for LLMs (2025)

The new 2025 vulnerabilities list is out. Learn about System Prompt Leakage, Excessive Agency, and how to secure your apps.

Read Guide

The CISO's Guide to the EU AI Act

A comprehensive breakdown of the EU AI Act's requirements, risk categories, and what it means for your enterprise AI strategy.

Read Guide

Prompt Injection 101

Understand the anatomy of prompt injection attacks, from basic jailbreaks to advanced multi-modal exploits, and how to defend against them.

Read Guide

Data Poisoning Attacks

"Garbage in, disaster out." How attackers manipulate training data and RAG knowledge bases to compromise your AI models.

Read Guide

Shadow AI Risk Assessment

Employees are using AI without IT's knowledge. Learn the risks of Shadow AI and how to implement a safe BYOAI policy.

Read Guide

SOC 2 for AI Companies

How to extend your SOC 2 Type II controls to cover AI models, training data, and inference pipelines.

Read Guide

EU AI Act: Technical Standards

Deep dive into the harmonized standards (CEN/CENELEC) that will define compliance for the EU AI Act.

Read Guide

NYC Local Law 144 (AEDT)

A guide to New York City's bias audit requirements for Automated Employment Decision Tools.

Read Guide

California SB 1047

Analysis of the California AI Safety Bill, the "kill switch" requirement, and what the veto means for the future.

Read Guide

GDPR & Generative AI

How to handle the "Right to be Forgotten" in LLMs and the challenges of Machine Unlearning.

Read Guide

HIPAA & Healthcare AI

Securing Protected Health Information (PHI) in GenAI applications. BAA requirements and de-identification.

Read Guide

Model Inversion Attacks

Learn how attackers use Model Inversion to reconstruct training data from AI outputs. Protect your sensitive datasets.

Read Guide

Adversarial Machine Learning

A primer on Evasion, Extraction, and Inference attacks. Understand how AI models can be tricked.

Read Guide

Securing RAG Architectures

Retrieval-Augmented Generation (RAG) introduces new attack vectors. Learn how to secure your vector database.

Read Guide

Advanced Prompt Injection

Beyond basic jailbreaks. Learn about Indirect Injection, Multi-Modal attacks, and Polyglot exploits.

Read Guide

AI Supply Chain Security

Managing risks from Hugging Face models, third-party APIs, and open-source libraries. Secure your AI BOM.

Read Guide

Deepfake Defense Strategy

Protecting corporate identity from synthetic media attacks. CEO fraud, voice cloning, and verification strategies.

Read Guide

Building an AI Governance Board

Who should be on your AI Governance Board? Learn how to structure the committee and define the charter.

Read Guide

AI Acceptable Use Policy

A ready-to-use AI Acceptable Use Policy (AUP) for your employees. Define what is allowed and forbidden.

Read Guide

The ROI of AI Governance

How to build the business case for AI security. Moving from 'cost center' to 'business enabler'.

Read Guide

Generative AI for CISOs

A strategic guide for Chief Information Security Officers. Top 5 priorities for 2025.

Read Guide

AI Transparency & Explainability

Why 'Black Box' models are a liability. Understanding SHAP values and Chain-of-Thought.

Read Guide

Ethical AI Frameworks

Moving beyond vague 'AI for Good' statements. How to operationalize ethical AI frameworks.

Read Guide

Vendor Risk Management

What questions should you ask your AI software providers? A guide to third-party risk management.

Read Guide

The Future of AI Regulation

Predictions for the next wave of AI laws. Global convergence, liability shifts, and the rise of 'AI Agencies'.

Read Guide

Stay Ahead of AI Threats

Get the latest research, vulnerability reports, and compliance updates delivered directly to your inbox.

AI Governance Resources & Guides | Railguard AI | Railguard AI