Secured AI Blog
Insights on AI security, data privacy, compliance, and protecting sensitive information in the age of LLMs.
Browse by Topic
Latest Articles
Data Privacy
What is PII? The Complete Guide to Personally Identifiable Information
Learn what PII is, what counts as personally identifiable information, 18 common examples, and practical steps to protect sensitive data in your systems and AI tools.
Secured AI TeamJanuary 19, 202615 min read
Compliance
What is PHI? A Practical Guide to Protected Health Information
Understand what PHI is under HIPAA, what counts as protected health information, common examples, the 18 identifiers, and practical safeguards for healthcare teams.
Secured AI TeamJanuary 19, 202618 min read
Data Privacy
PHI vs PII: What's the Difference (and Why It Matters in Healthcare)
Learn the difference between PHI and PII, where they overlap, common healthcare examples, and practical safeguards to reduce exposure across email, tickets, chat, and AI tools.
Secured AI TeamJanuary 19, 202620 min read
Best Practices
Enterprise AI Solutions: A Security-First Guide
A practical guide to enterprise AI solutions, including deployment options, RAG, AI agents, governance, and the security controls that prevent sensitive data leaks.
Secured AI TeamJanuary 19, 202622 min read
Most Popular
Get AI Security Insights Monthly
Join security professionals who receive our monthly roundup of AI privacy news, best practices, and product updates. No spam—just useful content.
We respect your privacy. Unsubscribe anytime.
Topics
AI Security
Data Privacy
Compliance
Product Updates
Industry Insights
Best Practices
Looking for More?
Explore our full library of resources.
The Secured AI blog covers the intersection of artificial intelligence, data privacy, and enterprise security. Our team of security practitioners, privacy advocates, and engineers share practical insights on protecting sensitive information in the age of LLMs. Topics include PII and PHI detection, context-preserving masking, HIPAA compliance for AI, SOC 2 considerations, and emerging threats in AI security.
