The Upcoming A.I. Act and How It Will Impact You
Author(s): Taimur Ijlal Originally published on Towards AI. The upcoming act will do for A.I. what GDPR did for privacy In my previous posts, I have talked about how A.I. risks do not exist in a vacuum and why it is so …
Attacking Large Language Models: LLMOps and Security
Author(s): Ulrik Thyge Pedersen Originally published on Towards AI. Assessing Vulnerabilities and Mitigating Risks in Internal Language Model Deployments Image by Author with @MidJourney In the realm of AI security, the spotliΝght often fallΝs on the prominentΝ facade β theΝ prompt. It …
How AI is Used to Combat Social Engineering AttacksβββPart 2
Author(s): John Adeojo Originally published on Towards AI. An Analysis of AI Approaches to Counteract URL Phishing Image by Author: Generated with Midjourney In the first part of this series, we briefly touched on the prevalence and costliness of social engineering attacks …
How AI is Used to Combat Social Engineering Attacks β Part 1
Author(s): John Adeojo Originally published on Towards AI. An Analysis of AI Approaches to Counteract URL Phishing Image by Author: Generated with Midjourney Social engineering attacks have emerged as the preferred form of a cyber attack by criminals aiming to gain access …
Uncovering the Dark Side of AI: Why Our Intelligent Systems Are More Vulnerable Than We Think
Author(s): Christian Kruschel Originally published on Towards AI. Artificial Intelligence (AI) has rapidly advanced in recent years and found extensive applications in many fields. These intelligent systems have remarkable capabilities to solve complex problems, improve efficiency, and achieve superior performance. However, they …
The AI Race for Industrial Cybersecurity
Author(s): Jorge AlcΓ‘ntara Barroso Originally published on Towards AI. State of the art, insights, and advice for the future AI in industrial cybersecurity is not a question. It will protect our critical infrastructures in an increasingly connected world. By learning from real-world …
Will AI Replace Cybersecurity Jobs?
Author(s): Taimur Ijlal Originally published on Towards AI. Do cybersecurity jobs have a limited lifespan as AI becomes better and better at securing stuff? This member-only story is on us. Upgrade to access all of Medium. Photo by h heyerlein on Unsplash …
So what are Inference Attacks
Author(s): Taimur Ijlal Originally published on Towards AI. Are you prepared for this new attack vector? This member-only story is on us. Upgrade to access all of Medium. Photo by Jefferson Santos on Unsplash Can you guess what type of attack this …
The Role of AI in Cybersecurity
Author(s): Zfort Group Originally published on Towards AI. Whatβs the first thing you think of when you hear βhackerβ? A solo user hunched over a computer and doing some loud typing to hack the network? Nothing of the sort! The present-day world …
Making The Smart Bet On Cybersecurity
Author(s): Charles Towers-Clark Originally published on Towards AI. Cybersecurity strategy doesnβt have to be a gamble, but trying to beat the odds of a breach is an impossible task. Educating your entire organization, and automating the most data-heavy tasks provide the best …
Limitations of Deep Learning
Author(s): Roberto Iriondo Originally published on Towards AI. Artificial intelligence has achieved incredible feats thanks to deep learning, however, it still falls short of human capabilities. Top highlight February 12, 2019, by Roberto Iriondo β last updated: April 7, 2019 This article …
Recommended Articles
Author(s): Roberto Iriondo Originally published on Towards AI. References: Top highlight December 19, 2018, by Roberto Iriondo β Updated May 5, 2020 Everyone despises CAPTCHAs (humans, since bots do not have emotions) β Those annoying images containing hard to read the text, …