How to Run a Private AI Model Locally with Ollama

What: Run an LLM Locally with Ollama If you’re curious about running a Large Language Model (LLM) on your own laptop — no cloud, no internet connection required — Ollama makes it surprisingly easy. It’s a simple way to use powerful open-source AI models directly on your machine. Ollama is a developer-friendly tool that makes it simple to run Large Language Models (LLMs) like Llama, Gemma, or Mistral locally on your laptop with just a single terminal command. Ollama supports a wide range of open-source models and is used by developers, researchers, and privacy-conscious professionals who want fast, offline access to AI without sending data to the cloud. ...

May 8, 2025 Â· 4 min

Advanced Message Security (AMS) - IBM MQ

Advanced Message Security (AMS) is a feature of IBM MQ designed to safeguard sensitive data while it travels across the IBM MQ network. Further reading Overview of Advanced Message Security - IBM Documentation Qualities of protection available with AMS - IBM Documentation Related IBM MQ

1 min

Checkmarx

Checkmarx is a US company that develops and sells application security software. Further reading About Checkmarx (Corporate site) Checkmarx (Wikipedia) Related Zed Attack Proxy (ZAP)

1 min

Cloud Security Alliance (CSA)

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes best practices for securing cloud computing environments through research, education, and industry collaboration. Related Cloud Control Matrix (CCM)

1 min

Cyber resilience frameworks

Cyber resilience frameworks provide practitioners with a structured approach to manage and mitigate cybersecurity risk, ensuring organisations can identify, respond and recover from a range of evolving threats. Frameworks such as the NIST Cybersecurity Framework (CSF) and ISO 27001, offer best practices, example controls, and guidelines to strengthen security posture, align with regulatory requirements, and build operational resilience. By adopting a suitable framework, organisations can improve governance, increase the ability to respond to incidents, safeguarding critical systems, data, and processes. ...

1 min

Data Protection

Data protection refers to the practices, safeguards, and rules put in place to protect personal information and ensure that individuals’ privacy rights are respected. Data protection procedures in an organisation will involve the secure handling of data to prevent unauthorised access, disclosure, alteration, or destruction. Effective data protection measures are essential for maintaining trust, and for compliance with legal and regulatory requirements. Related pages Data privacy Data classification Data disposal Worldwide data transfer Data controller Data processor Data subject rights Data breach

1 min

Encryption

Encryption is the process of scrambling data to make it unreadable to unauthorised individuals in order to protect its confidentiality. Technically, this involves using an algorithm and a cryptographic key to transform the original plaintext (readable data) into ciphertext (unreadable data). Only individuals who possess the corresponding decryption key can reverse this process and restore the data to its original readable form. Further reading The Code Book, by Simon Singh

1 min

Kubernetes Secrets

Kubernetes Secrets provide a secure way to manage sensitive information, such as passwords, tokens, or keys, by storing and then accessing them separately from application code. This reduces the risk that the secret is exposed when working with pods or containers. Best Practice Good practices for Kubernetes Secrets (Official Documentation) Best practices for Kubernetes Secrets management (Snyk) How to Handle Secrets in Kubernetes (GitGuardian) Further Reading Kubernetes Secrets (Official Documentation) ...

1 min

Secrets Management

0 min

What is Kubernetes? Origins, Security Implications, and Future Outlook

What is Kubernetes? Kubernetes, often abbreviated as K8s, is an open-source platform designed to automate the deployment, scaling, and management of containerised applications. It orchestrates clusters of machines, ensuring that application components run reliably and efficiently across diverse environments. At its core, Kubernetes abstracts the underlying infrastructure, allowing developers and operators to define the desired state of their applications. The system then works to maintain this state, handling tasks like load balancing, scaling, and self-healing without manual intervention. ...

3 min