Remove application-security how-to-secure-machine-learning
article thumbnail

Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity

The Security Ledger

Paul speaks with Gary McGraw of the Berryville Institute of Machine Learning (BIML), about the risks facing large language model machine learning and artificial intelligence, and how organizations looking to leverage artificial intelligence and LLMs can insulate themselves from those risks. Read the whole entry. »

article thumbnail

Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

Security Boulevard

The terms "machine learning" and "artificial intelligence" are frequently used in cybersecurity, often interchangeably, leading to confusion about their precise meanings and applications. And how do these technologies converge to bolster cyber resilience? What are the disparities between them?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC Fireside Chat: Extending ‘shift left’ to achieve SSCS — ‘software supply chain security’

The Last Watchdog

One of the nascent security disciplines already getting a lot of buzz as RSA Conference 2023 gets ready to open next week at San Francisco’s Moscone Center is “software supply chain security,” or SSCS. True software supply chain security is about looking at the application in a holistic way just prior to deployment,” Rose observes.

Software 200
article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

On the other hand, it’s been portrayed as a potential threat to our privacy, security, creativity and even mankind’s existence. So where does AI stand in the realm of cybersecurity, and how can we leverage it for protection rather than harm? Is it our only hope for survival?These

article thumbnail

GUEST ESSAY: A primer on why AI could be your company’s cybersecurity secret weapon in 2022

The Last Watchdog

Related: Deploying human security sensors. Using supervised learning, this finds relationships between input and output variables; for example a person’s weight based on known height. DTs are applicable to regression and classification problems. Support Vector Machines (SVM): SVMs are excellent for limited data analysis.

article thumbnail

Black Hat Fireside Chat: Easy come, easy go access strengthens ‘Identity Threat Detection & Response’

The Last Watchdog

How did they obtain this access? I had the chance to sit down with Trustle CEO Emiliano Berenbaum to learn just how ITDR can help companies much more efficiently manage user identities and access privileges, while also strengthening security, in an increasingly complex operating environment.

article thumbnail

How to Protect Your Machine Learning Models

Thales Cloud Protection & Licensing

How to Protect Your Machine Learning Models madhav Thu, 02/15/2024 - 07:20 Contributors: Dr. Werner Dondl and Michael Zunke Introduction In computer technology, few fields have garnered as much attention as artificial intelligence ( AI) and machine learning (ML).