article thumbnail

Data privacy examples

IBM Big Data Hub

These are just some examples of how organizations support data privacy , the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. For example, they can decline to have their data shared with third parties while allowing the app to generate personalized offers.

article thumbnail

GUEST ESSAY: The case for using augmented reality (AR) and virtual reality (VR) to boost training

The Last Watchdog

Augmented reality (AR) and virtual reality (VR) technologies provide intriguing opportunities for immersive and interactive experiences in cybersecurity training. Related: GenAI’ impact on DevSecOps Here’s how these technologies can bridge learning gaps in cybersecurity awareness and enhance the overall training experience.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Extracting GPT’s Training Data

Schneier on Security

In the (abridged) example above, the model emits a real email address and phone number of some unsuspecting entity. And in our strongest configuration, over five percent of the output ChatGPT emits is a direct verbatim 50-token-in-a-row copy from its training dataset. This happens rather often when running our attack.

Paper 114
article thumbnail

Researchers devised an attack technique to extract ChatGPT training data

Security Affairs

Researchers devised an attack technique that could have been used to trick ChatGPT into disclosing training data. A team of researchers from several universities and Google have demonstrated an attack technique against ChetGPT that allowed them to extract several megabytes of ChatGPT’s training data. ” continues the analysis.

Paper 116
article thumbnail

What is Tailgating? Definition, Examples & Prevention

IT Governance

Fraudsters have countless tricks up their sleeves to bypass security measures and access sensitive information. The same principle, believe it or not, applies in a cyber security context. More specifically, the fraudster is trying to gain physical access to a secure part of the premises so that they can steal confidential information.

article thumbnail

Shedding light on AI bias with real world examples

IBM Big Data Hub

Examples of AI bias in the real world show us that when discriminatory data and algorithms are baked into AI models, the models deploy biases at scale and amplify the resulting negative effects. ” Examples of AI bias from real life provide organizations with useful insights on how to identify and address bias.

article thumbnail

Security Training: Moving on from Nick Burns Through Better Communication

eSecurity Planet

A recent experience highlighted that security awareness training and most alerts to users about unsafe practices may be making the error of being too general. An alert came in one morning about a security alert generated by my device. Some in IT are ill-suited to helping users understand security-specific information.