cybersecurity

Artificial IntelligenceCybersecurityMachine Learning

The approach maintains an AI model’s accuracy while ensuring attackers can’t extract secret information.

Read More
Artificial IntelligenceCybersecurityMachine Learning

3 Questions: Modeling adversarial intelligence to exploit AI’s security vulnerabilities

MIT CSAIL Principal Research Scientist Una-May O’Reilly discusses how she develops agents that reveal AI models’ security weaknesses before hackers do.

Read More
Artificial IntelligenceCybersecurityMachine Learning

New security protocol shields data from attackers during cloud-based computation

The technique leverages quantum properties of light to guarantee security while preserving the accuracy of a deep-learning model.

Read More
Artificial IntelligenceCybersecurityMachine LearningSocial Media

3 Questions: How to prove humanity online

AI agents could soon become indistinguishable from humans online. Could “personhood credentials” protect people against digital imposters?

Read More
Artificial IntelligenceCybersecurity

Melissa Choi named director of MIT Lincoln Laboratory

With decades of experience working across the laboratory’s R&D areas, Choi brings a focus on collaboration, technical excellence, and unity.

Read More
Artificial IntelligenceCybersecurity

Eric Evans receives Department of Defense Medal for Distinguished Public Service

The award recognizes his contributions as director of MIT Lincoln Laboratory and as vice chair and chair of the Defense Science Board.

Read More
CybersecurityDigitalDigital Architecture

Understanding and Implementing Zero Trust Architecture: A Comprehensive Overview

Zero Trust Architecture is not only a cybersecurity strategy; it’s a business strategy, a digital transformation strategy. It is an integral aspect of planning and executing digital transformation initiatives, acting as a secure foundation upon which digital innovation can flourish. As digital transformation continues to progress, so too will the importance of Zero Trust Architecture in enabling secure, resilient, and successful digital transformation.

Read More
Artificial IntelligenceCybersecurityData PrivacyDigitalRisk ManagementTechnology

Deepfake Impersonations: Beware the Sound of Fraud!

People are falling for spoofed voice hackers For example, in March 2019, criminals used artificial intelligence-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000). This scam is sometimes referred to as “vishing,” or voice phishing. In another case, cybercriminals cloned the voice of – See more –

Read More