The approach maintains an AI model’s accuracy while ensuring attackers can’t extract secret information.
cybersecurity
3 Questions: Modeling adversarial intelligence to exploit AI’s security vulnerabilities
MIT CSAIL Principal Research Scientist Una-May O’Reilly discusses how she develops agents that reveal AI models’ security weaknesses before hackers do.
Read MoreNew security protocol shields data from attackers during cloud-based computation
The technique leverages quantum properties of light to guarantee security while preserving the accuracy of a deep-learning model.
Read More3 Questions: How to prove humanity online
AI agents could soon become indistinguishable from humans online. Could “personhood credentials” protect people against digital imposters?
Read MoreMelissa Choi named director of MIT Lincoln Laboratory
With decades of experience working across the laboratory’s R&D areas, Choi brings a focus on collaboration, technical excellence, and unity.
Read MoreEric Evans receives Department of Defense Medal for Distinguished Public Service
The award recognizes his contributions as director of MIT Lincoln Laboratory and as vice chair and chair of the Defense Science Board.
Read MoreUnderstanding and Implementing Zero Trust Architecture: A Comprehensive Overview
Zero Trust Architecture is not only a cybersecurity strategy; it’s a business strategy, a digital transformation strategy. It is an integral aspect of planning and executing digital transformation initiatives, acting as a secure foundation upon which digital innovation can flourish. As digital transformation continues to progress, so too will the importance of Zero Trust Architecture in enabling secure, resilient, and successful digital transformation.
Read MoreDeepfake Impersonations: Beware the Sound of Fraud!
People are falling for spoofed voice hackers For example, in March 2019, criminals used artificial intelligence-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000). This scam is sometimes referred to as “vishing,” or voice phishing. In another case, cybercriminals cloned the voice of – See more –
Read More

You must be logged in to post a comment.