AI Security
Our Security of AI Papers and Blogs Explained
Moderately relevant AI made image about AI papers :-) steampunk ofc!Recently our team has written several papers and blogs focused on securing AI. What you will not see in these papers is anything ...
Defending AI Apps Against Abuse: A Real-World Case Study
Gain insights on defending your AI apps from abuse based on our real-world experiences helping customers combat emerging adversarial threats ...
Protect AI Acquires Laiyer AI to Better Secure AI Models
Protect AI has acquired Laiyer AI, a provider of open source software used to protect LLMs from security threats ...
AI Poses Challenges, Opportunities for IT Security Leaders
Organizations are keen to deploy AI for new revenue growth and productivity initiatives, but threat actors are also ramping up on generative AI-powered attacks ...
Don’t Say ‘Skynet’ — NSA’s AI Security Center is New Hub for Agency Efforts
COME WITH ME IF YOU WANT TO LIVE: Nothing suspicious to see here—move along ...
AI Essential to Secure Dev, Successful DevSecOps—Yet Risks Abound
When finding security vulnerabilities within software built by in-house developers, there’s good reason to believe that development teams, thanks in part to the help of AI tools, are actually “shifting left” when ...
New Paper: “Securing AI: Similar or Different?“
As you may have noticed, we have released a new paper on securing AI. I want to share a few additional things here on top our official launch blog.src: http://bit.ly/ociso-ai1-podFor a few years ...
No Deep AI Security Secrets In This Post!
I am not an AI security expert (I hear there are very few of those around). I am essentially a motivated amateur learner in AI security … and I would even trust Bard ...
DEF CON 28 Safe Mode AI Village – Erick Galinkin’s ‘Baby’s First 100 MLSec Words’
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel ...
DEF CON 28 Safe Mode AI Village – Younghoo Lee’s & Joshua Saxe’s ‘Detecting Social Engineering Emails With A Bleeding Edge Neural Model’
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel ...