Remove application-security how-to-secure-machine-learning
article thumbnail

Machine vs. machine

OpenText Information Management

This AI-generated moose has been on the hunt for threats and keeping security top of mind. You: How has AI evolved the landscape of security? Take a proactive stance to simplify your security stack to give your business the best visibility and protection. You: What can we do to protect our businesses?

article thumbnail

Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity

The Security Ledger

Paul speaks with Gary McGraw of the Berryville Institute of Machine Learning (BIML), about the risks facing large language model machine learning and artificial intelligence, and how organizations looking to leverage artificial intelligence and LLMs can insulate themselves from those risks. Read the whole entry. »

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Extending ‘shift left’ to achieve SSCS — ‘software supply chain security’

The Last Watchdog

One of the nascent security disciplines already getting a lot of buzz as RSA Conference 2023 gets ready to open next week at San Francisco’s Moscone Center is “software supply chain security,” or SSCS. True software supply chain security is about looking at the application in a holistic way just prior to deployment,” Rose observes.

Security 200
article thumbnail

Unlocking AI potential for CISOs: A framework for safe adoption

OpenText Information Management

Some of these AIs include machine learning (ML), and natural language processing (NLP) in the AI category, which makes AI more inclusive. Developers are eager to build LLMs for their business applications and system integrators are eager to integrate AI into their existing job functions. billion by 2030.

article thumbnail

Black Hat Fireside Chat: Easy come, easy go access strengthens ‘Identity Threat Detection & Response’

The Last Watchdog

How did they obtain this access? I had the chance to sit down with Trustle CEO Emiliano Berenbaum to learn just how ITDR can help companies much more efficiently manage user identities and access privileges, while also strengthening security, in an increasingly complex operating environment.

Access 189
article thumbnail

GUEST ESSAY: A primer on why AI could be your company’s cybersecurity secret weapon in 2022

The Last Watchdog

Related: Deploying human security sensors. Using supervised learning, this finds relationships between input and output variables; for example a person’s weight based on known height. DTs are applicable to regression and classification problems. Support Vector Machines (SVM): SVMs are excellent for limited data analysis.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Acohido to share his ideas about the current cyber threat landscape, the biggest threats for businesses today, the role of AI and machine learning in cyberattacks and cyberdefence, and the most effective methods for companies to protect themselves. Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security.