Remove Artificial Intelligence Remove Book Remove Internet Remove Risk
article thumbnail

Introducing meaningful AI features for information security in 2024

IT Security Guru

Nick Graham, Chief Technology Officer at information security software business Hicomply discusses the recent surge in interest around artificial intelligence. In 2023, we saw artificial intelligence gain a foothold in the public consciousness like never before. The automation maps risks against core assets automatically.

article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

Here’s the latest: a training-time attack that forces the model to exhibit a point of view: Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures.” Systems like GPT-3 will make it easy for those AIs to mine previous conversations and related Internet content and to appear knowledgeable.

Media 239
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Demand, CyberInsurance, and Automation/AI Are the Future of InfoSec

Daniel Miessler

Insurance companies will perform massive, centralized data aggregation exercises as part of their setup process for customers, and they’ll use that as input into their algorithms that determine risk of breach payout. Automation (powered by AI). If you get value from this content, you can support it directly by becoming a member.

InfoSec 255
article thumbnail

Security in 2020: Revisited

Schneier on Security

Call it decentralization : our email, photos, books, music, and documents are stored somewhere, and accessible to us through our consumer devices. Others, like Internet-enabled game machines or digital cameras, are truly special purpose. Similarly, connecting objects to the Internet will soon be cheap enough to be viable.

article thumbnail

Episode 187: Filtergate is DRM for Water

The Security Ledger

» Related Stories Episode 186: Certifying Your Smart Home Security with GE Appliances and UL Spotlight Podcast: Two Decades On TCG Tackles Trustworthiness For The Internet of Things Spotlight Podcast: As Attacks Mount, ERP Security Still Lags. But such approaches carry real risks. Read the whole entry. »

article thumbnail

Episode 168: Application Security Debt is growing. Also: Web App Security in the Age of IoT

The Security Ledger

ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect? Read the whole entry. » » Related Stories Huge Survey of Firmware Finds No Security Gains in 15 Years Episode 166: But Why, AI? Also: making Passwords work. Securing Web Applications in the Age of the IoT.

IoT 40
article thumbnail

Episode 168: Application Security Debt is growing and Securing Web Apps in the Age of IoT

The Security Ledger

ZestAI’s Quest to make Artificial Intelligence Explainable Episode 164: Who owns the Data Smart Cars collect? Read the whole entry. » » Related Stories Huge Survey of Firmware Finds No Security Gains in 15 Years Episode 166: But Why, AI? Also: making Passwords work. Securing Web Applications in the Age of the IoT.

IoT 40