Remove 2017 Remove Events Remove Mining Remove Video
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. While there are many unpredictable underlying reasons why new attacks emerge, in our experience the following two types of events are likely to trigger their emergence: New product or feature launch : By nature adding functionalities opens up new attack surfaces that attackers are very quick to probe.

Mining 107
article thumbnail

Attacks against machine learning — an overview

Elie

as highlighted in the video above. While there are many unpredictable underlying reasons why new attacks emerge, in our experience the following two types of events are likely to trigger their emergence: New product or feature launch : By nature adding functionalities opens up new attack surfaces that attackers are very quick to probe.

Mining 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Nor am I going to wade into the debate about the ecological consequences of mining cryptocurrencies. Vranken: Well, mining means cracking a puzzle, which has a certain amount of time and that takes like 10 seconds or something. So there are companies which only mine cryptocurrencies and they make money by this. Vranken: Yeah.

article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

WilliamCaraher) October 10, 2017. All of this was going on at the same time as me travelling the world, speaking at events, running workshops and doing a gazillion other things just to keep life ticking along. HIBP's brand is intrinsically tied to mine and at present, it needs me to go along with it. 10 — ???ll??

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

ARMA (2017) describes RIM practices as the “knowledge and skills required to systematically manage information assets from creation or receipt through processing, distributing, sharing, using, accessing, organizing, storing and retrieving, and disposing of them. What are traditional RIM practices? Intelligent Capture.