Cybersecurity

Artificial IntelligenceCybersecurityMachine Learning

MIT scientists investigate memorization risk in the age of clinical AI

New research demonstrates how AI models can be tested to ensure they don’t cause harm by revealing anonymized patient health data.

Read More
Artificial IntelligenceCybersecurity

New MIT program to train military leaders for the AI age

The new certificate program will equip naval officers with skills needed to solve the military’s hardest problems.

Read More
Artificial IntelligenceCybersecurityEnergy

Lincoln Lab unveils the most powerful AI supercomputer at any US university

Optimized for generative AI, TX-GAIN is driving innovation in biodefense, materials discovery, cybersecurity, and other areas of research and development.

Read More
AI StrategyAI ThreatDigital

Google’s Gemini Alert: Hidden Prompt Injections and the Risk Factor That Could Sink Your AI Strategy

Google’s alarming AI security alert is a stark warning for executives complacently underestimating risks in the evolving AI landscape. As hackers deploy indirect prompt injections to exploit AI vulnerabilities, organizations must recognize that overlooking these threats is folly. Ignoring cybersecurity imperils investments and operational integrity—risk management isn’t just necessary; it’s a critical enabler for sustainable AI success. Stay vigilant leveraging the ECI framework.

Read More
AI RegulationAI StrategyAI ThreatCybersecurityDigital

Quantum AI: Unleashing the Next Frontier in Enterprise Intelligence

Quantum AI isn’t just a vision—it’s the game-changer that CIOs and CDOs must embrace now or risk getting sidelined. Quantum computing and AI promises to transform industries through unprecedented computational power. Early experimentation in model training, drug discovery, and more will separate leaders from laggards.

Read More
Artificial IntelligenceCybersecurityMachine Learning

The approach maintains an AI model’s accuracy while ensuring attackers can’t extract secret information.

Read More
AI RegulationAI ThreatCybersecurity

Who is liable now? Transforming Traditional Risk Calculus

The withdrawal of the EU’s AI Liability Directive amplifies complexities for financial institutions facing the convergence of generative AI, quantum computing, and IoT. This legal uncertainty jeopardizes accountability, heightens security vulnerabilities, and compounds systemic risks, compelling a critical transformation in risk management frameworks urgently needed to navigate these evolving challenges.

Read More
AI StrategyZero Trust Architecture

Privately Hosted AI Appliances: Best Practices for Secure and Scalable Deployment

Enterprises are shifting towards privately hosted AI appliances, driven by the need for enhanced data security, compliance, and cost efficiency. This strategic pivot allows organizations to maintain control over sensitive data and optimize performance while facing challenges in deployment. As AI evolves, this decision promises significant competitive advantages across various industries.

Read More
AI StrategyCybersecurityLarge Language Model

The New Art of War: Mastering AI Warfare in the Age of Digital Combat

In a rapidly evolving technological landscape, cybersecurity strategies must adapt to unprecedented threats posed by GenAI, quantum computing, and IoT convergence. Traditional defenses are inadequate against sophisticated, autonomous attacks that exploit identity confusion and prompt injection. Urgent, proactive governance reforms are essential to safeguard against profound ethical and societal implications.

Read More
AI RegulationAI StrategyAI ThreatCybersecurityResponsible AIZero Trust Architecture

The State of Enterprise Cyber Risk in the Age of AI

AI is reshaping the battlefield of cybersecurity, acting as both a defender and a threat. Organizations face a stark choice: embrace AI to fortify defenses or risk devastation from increasingly sophisticated attacks. As breaches grow costlier, the call for proactive, intelligent strategies has never been more urgent. Will enterprises adapt or fall prey?

Read More