Ken Huang

Ken Huang

Washington DC-Baltimore Area
27K followers 500+ connections

About

Ken Huang is a prolific author and renowned expert in AI and Web3, with numerous…

Services

Articles by Ken

Activity

27K followers

See all activities

Experience

  • Duco Graphic
  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Fairfax County, Virginia, United States

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Fairfax

  • -

  • -

    Fairfax

  • -

    Boston, MA

  • -

    Fairfax County, Virginia, United States

  • -

Education

Licenses & Certifications

Publications

  • Exploring the Intersection of IAM and Generative AI in the Cloud

    Cloud Security Alliance AI Blog

    Identity and Access Management (IAM) plays an indispensable role in shaping the security landscape of Generative AI (GenAI) and its associated infrastructure, particularly in cloud environments. This significance stems from the unique complexities and sensitivities associated with GenAI models, which often require vast amounts of data and computational power. The impact of IAM on GenAI and its infrastructure can be dissected into several key areas: data security, model security, and…

    Identity and Access Management (IAM) plays an indispensable role in shaping the security landscape of Generative AI (GenAI) and its associated infrastructure, particularly in cloud environments. This significance stems from the unique complexities and sensitivities associated with GenAI models, which often require vast amounts of data and computational power. The impact of IAM on GenAI and its infrastructure can be dissected into several key areas: data security, model security, and infrastructure security, each catering to different types of users and access needs.

    See publication
  • Sample Security tools for the Cloud Computing Environment

    Ken Huang's Cloud Security Blog

    I listed the sample essential Security tools for the Cloud Service Provider.

    See publication
  • Mobile Technology, Application and Security Trends

    HDI Executive Forum

    Mobile Technology such as Wifi, 3G&4G, NFC and Bleutooth are discussed in the presentation, mobile application including Google Wallet and Mobile Payment powered with NFC is also discussed. The security trends on the protocol level as well as application levels are also illustrated in the slides.

    See publication

Honors & Awards

  • IEEE Invited Keynote Speaker on AI

    -

    Invited by IEEE on manyl AI Safety and Distributed Computing related conferences.

Organizations

  • ISC2

    -

    - Present

Recommendations received

View Ken’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ken directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses