Free · Open · No gatekeeping

Learn
AI
Security.

Built for beginners, practitioners, and everyone in between. No assumed knowledge. No skipped steps. Just clear, honest education from inside the industry.

8×
Deep dives
4
Frameworks
Free
Always
VS
Venicia Solomons
Cyber Queen
73%
of enterprises have hundreds of AI models running in production right now
41%
reported an AI security incident by late 2024 with zero AI-specific controls
0
excuses for not understanding the attack surface you are responsible for securing
Why this series exists

The attack surface is here.
Most teams are not ready.

AI is not a future problem for security professionals to figure out someday. It is a present one. This series exists to close that gap — one fundamental at a time.

🎯
Built for real learning
No assumed knowledge. No skipped steps. We start from what a model actually is and build from there. Breaking in or already working in security, there is something here for you.
🔓
Completely free and open
Every resource lives in this GitHub repo. No paywall. No course to buy. Security education should be accessible to everyone — full stop.
Practical, not theoretical
Real incidents. Real models. Real controls. Every post is grounded in what is actually happening in enterprise environments right now.
🌍
Built by someone in the room
Venicia works in Cloud & AI Security. The insights here come from inside the industry, shared freely with the community.

The series

8 fundamentals.
Start anywhere.

Each post covers one core concept. Read in order for the full picture, or jump to what is most relevant to where you are right now.

Post 01
The Model
What a model actually is, the 3 core attack paths, real incidents, security controls, and the 4 frameworks you need to know.
● Live now
Post 02
Training vs Inference
Two completely different attack surfaces. Understanding the difference changes how you think about AI risk entirely.
Coming soon
Post 03
Prompts are Inputs
Where prompt injection lives and why treating prompts as trusted input is one of the most dangerous mistakes in AI deployment.
Coming soon
Post 04
Context Windows
What the model sees at any given time and how attackers use that window against you.
Coming soon
Post 05
Embeddings & Vector Databases
How AI remembers things, how RAG pipelines work, and the retrieval-based attacks most teams are completely unprepared for.
Coming soon
Post 06
Agents & Tool Use
When AI can take actions, the blast radius explodes. The most important post in this series right now.
Coming soon
Post 07
Fine-tuning & RLHF
How models get customised and why the supply chain risk at the AI layer needs to be on every security team's radar.
Coming soon
Post 08
APIs as the Delivery Mechanism
Most enterprise AI is API-first. Classic API attack surface — now with an LLM sitting on top of it.
Coming soon
Watch on YouTube

Learn with me.
Latest videos.

▶️ Visit the Channel
Latest
Watch on YouTube →
Click to watch the latest video on the Cyber Queen channel.
Recent
Watch on YouTube →
Click to watch more content on the Cyber Queen channel.