Generative AI, Confidential Computing, and Post-Quantum Cryptography, Among Interesting Topics at Google Cloud NEXT
Thales Cloud Protection & Licensing
JUNE 5, 2024
With AI implementations, cybersecurity attacks can occur at different states of the AI pipeline including data collection, model creation and training, and at inference. Sensitive workloads can include personal identifiable information (PII) data, AI models, trade secrets, and/or intellectual property.
Let's personalize your content