Welcome to Information Security Media Group's Black Hat and DEF CON 2024 Compendium featuring latest insights from the industry's top cybersecurity researchers and ethical hackers, as well as perspectives from CEOs, CISOs and government officials on the latest trends in cybersecurity and AI.
Data is one of the most frequent targets for cyberattacks and also one of the hardest assets to protect. With growing data volumes, increased regulatory requirements and the shift toward AI, organizations face significant challenges in understanding which sensitive data they hold, who has access to it and where it’s...
Large language models such as ChatGPT are trained on massive amounts of data generated from publicly available sources including Wikipedia, news, blogs, publications and Common Crawl. The problem lies in the datasets themselves - how they are licensed, sourced and used.
Shachar Menashe, senior director of security research at JFrog, discusses critical security risks in MLOps platforms - including code execution vulnerabilities in machine learning models - and why organizations must treat ML models as potentially malicious code to mitigate these inherent risks.
This week, the European Union's AI Act has gone into force, marking a significant step in AI development. Starting Aug. 1, 2024, it will enforce strict rules on high-risk AI systems and prohibit harmful practices, to ensure transparency and protect fundamental rights.
Die Nutzung von KI ist mittlerweile weit verbreitet. Bei einer Studie von McKinsey gaben 55 % der Befragten an, dass in ihrem Unternehmen bereits KI eingeführt wurde. Viele von ihnen profitieren nun unter anderem von verbesserter Produktivität, Entscheidungsfindung, Kundenerfahrung und Innovationskraft.
Jetzt ist...
Usage of AI is already widespread, with 55% of respondents in a McKinsey study reporting that their organizations have already adopted AI. And many of them are reaping the benefits through improved productivity, decision-making, customer experience, innovation and beyond.
Now is the time to develop a thoughtful AI...
The U.S. Federal Trade Commission demanded information from a clutch of firms that advertise their ability to match consumers with prices through AI, dubbing the practice "surveillance pricing." Digitized consumer data has led to years of warnings that retailers dynamically set prices.
The U.S. Department of Energy unveiled a road map to harness AI, with a core goal of building energy-efficient supercomputers. The road map covers AI infrastructure, the assets it will deliver for national interests and a framework for providing a national AI program.
A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.
Gartner's comprehensive playbook for chief data and analytics officers outlines key steps to transform AI ambitions into disruptive realities. From defining strategy to measuring benefits, Gartner says this guide will pave the way for AI-driven innovation and leadership.
Securing an organization often requires making fast decisions, said Tom Corn of Ontinue, and AI can gather information that you can use to answer the questions you have about how to handle a security problem. Corn discusses operationalizing an AI-first approach to security.
JFrog's acquisition of Qwak will integrate advanced MLOps capabilities into the company's existing DevSecOps platforms. The transaction aims to improve model deployment efficiency, enhance security measures and integrate AI development features for end-to-end offerings.
Researchers have found a new way of poisoning machine learning models that could allow hackers to steal data and manipulate the artificial intelligence unit's output. Using the Sleepy Pickle attack method, hackers can inject malicious code into the serialization process, said Trail of Bits.
Jake Gillen, principal solutions architect at Expel, discusses the crucial role of artificial intelligence and machine learning technology in transforming security operations centers or SOCs, using automation to mitigate rapidly evolving cyberthreats and accelerate incident response.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing aitoday.io, you agree to our use of cookies.