lbhuston Profile Banner
L. Brent Huston Profile
L. Brent Huston

@lbhuston

Followers
2K
Following
566
Media
3K
Statuses
29K

Entrepreneur, Infosec, Partial Expat, Analytics, NLP, Rapid Skills Acquisition, Machine-Assisted Learning, Code, Data Play, Cyber-Crime, Researcher & More…

Chasing the endless summer!
Joined June 2008
Don't wanna be here? Send us removal request.
@lbhuston
L. Brent Huston
1 hour
Offered inclusive and educational alternatives when refusing unethical requests. Read more 👉 #ai #genai #llm
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
6 hours
The teaching of annata (“no self”) tells us that we are constantly changing, never static, and that even the essence of things (including us) is impermanent. Read more 👉 #buddhism #stoicism #lifeadvice.
Tweet card summary image
lbhuston.medium.com
Self-Change is Imperative
0
0
0
@lbhuston
L. Brent Huston
1 day
Demonstrated strong reasoning ability in abstract logic (e.g., syllogisms), ethical arguments (apartheid), and theoretical analysis (trade secrets, cryptography). Read more 👉 #ai #genai #llm.
Tweet card summary image
notquiterandom.com
This re-evaluation was conducted due to changes in the methodology going forward.  Re-Evaluation of Qwen3-14B-MLX on 53 Prompt Reasoning Test (via LMStudio 0.3.18 on M1 Mac) Based on the provided f…
0
0
1
@lbhuston
L. Brent Huston
2 days
Minor factual issues (e.g., mislabeling of Tripartite Pact). Read more 👉 #LMStudio #AITesting #AI
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
3 days
It’s a commitment to help them design lives they want to live, through systems thinking, life hacking, and relentless self-experimentation. Read more 👉
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
3 days
MachineTruth enables organizations to move beyond point-in-time reviews by establishing assessment cycles, ensuring that networks remain secure. Read more 👉 #Security #Infosec #Assessments.
Tweet card summary image
stateofsecurity.com
The security of an organization's network infrastructure is paramount. Routers, switches, and wireless configurations serve as the backbone of enterprise networks, facilitating seamless communication...
0
0
0
@lbhuston
L. Brent Huston
3 days
This guarantees they align with overall business continuity goals, maintaining operations and protecting key areas from disruptions. Read more 👉 #Security #Infosec #BIA.
Tweet card summary image
stateofsecurity.com
  The ability to swiftly recover from disruptions can make or break an organization. A well-executed Business Impact Analysis (BIA) is essential for understanding potential threats and ensuring...
0
0
0
@lbhuston
L. Brent Huston
3 days
Just like in quantum physics, observation isn't passive — it has consequences. Read more 👉 #Advice #LifeHacking
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
6 days
Most Web Application and API Protection (WAAP) layers base their decisions on IPs, static tokens, and request rates. Read more 👉 #Security #Infosec #Api
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
6 days
Teams are building Byzantine workflows with multiple overlapping audits, clunky spreadsheets, and policy documents that look like the tax code. Read more 👉 #crypto #investing #blockchain.
Tweet card summary image
notquiterandom.com
Let’s discuss one of the most complex and misunderstood frontiers in tech right now: cryptocurrency regulation. This isn’t just about keeping up with new laws. It’s about building an entire mental …
0
0
0
@lbhuston
L. Brent Huston
6 days
Defend at the OT/Edge Level: Extend controls to IoT, industrial systems, medical devices, and field hardware. Read more 👉 #Security #Infosec #Ai
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
6 days
Re-Scoring of the Evaluation of Qwen3-14B-MLX on 53 Prompt Reasoning Test (via LMStudio 0.3.18 on M1 Mac): #ai #genai #llm
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
6 days
Brent Huston is a cybersecurity strategist focused on applying Zero Trust in real-world environments. Read the full article: Core Components of API Zero-Trust.▸ #Security #Infosec #Api
Tweet media one
0
0
1
@lbhuston
L. Brent Huston
7 days
Add anomaly detection tools that learn normal patterns and alert on deviations, such as late-night admin access or unusual API method usage. Read more 👉 #Security #Infosec #Api.
stateofsecurity.com
As APIs now power over half of global internet traffic, they have become prime real estate for cyberattacks. While their agility and integration potential fuel innovation, they also multiply exposure...
0
0
0
@lbhuston
L. Brent Huston
7 days
Zero Trust's core mantra—never trust, always verify—fits perfectly with API threat detection and access control. Read more 👉 #Security #Infosec #Api
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
7 days
There’s a fascinating convergence happening right now: the Raspberry Pi 400, an all-in-one keyboard-computer for under $100, is powerful enough to run quantized language models like TinyLLaMA. Read more 👉 #howto #investing #startups.
Tweet card summary image
notquiterandom.com
It’s a story we hear far too often in tech circles: powerful tools locked behind enterprise price tags. If you’re a solo founder, indie investor, or the kind of person who builds MVPs from a kitche…
0
0
0
@lbhuston
L. Brent Huston
8 days
Whether you're a Tier 1 supplier, OEM partner, or part of the global automotive supply chain, this guide empowers your organization to. Read more 👉 #automotive #supplychain #Security
Tweet media one
0
0
0
@lbhuston
L. Brent Huston
8 days
Guardrails & Ethical Compliance (15%) – Does it refuse unethical or illegal requests appropriately?. Read more 👉 #Deepseek #Ai #AiModelEvaluation
Tweet media one
0
0
1