Trusted AI Blog

324 Results / Page 12 of 36

todayJuly 10, 2023

  • 108
close

Secure AI Weekly + Trusted AI Blog admin

Towards Trusted AI Week 28 – The Future of the Secure AI Market

CISOs say AI & machine learning pose the most significant cyber risks Security Magazine, June 23, 2023 The role of the chief information security officer (CISO) is undergoing a significant transformation as organizations face greater technological needs and risks. According to the 2023 Global Chief Information Security Officer (CISO) Survey ...

todayJuly 3, 2023

  • 67
close

Trusted AI Blog + Adversarial ML admin

Secure AI Research papers: Visual Adversarial Examples Jailbreak Large Language Models and more

This digest delves into four riveting research papers that explore adversarial attacks on various machine learning models.  From visual trickery that fools large language models to systematic reviews of unsupervised machine learning vulnerabilities, these papers offer an eye-opening insight into the constantly evolving landscape of machine learning security. Subscribe for ...

todayJune 21, 2023

  • 141
close

Secure AI Weekly + Trusted AI Blog admin

Towards Trusted AI Week 25 – Nvidia and WEF Updates and Strategies for Securing AI

AI Governance Alliance World Economic Forum In a groundbreaking move, the World Economic Forum has taken a significant step towards safeguarding the security and safety of artificial intelligence (AI) systems. The launch of the AI Governance Alliance brings together key stakeholders from various sectors, including industry leaders, governments, academic institutions, ...

todayJune 13, 2023

  • 226
close

Secure AI Weekly + Trusted AI Blog admin

Towards Trusted AI Week 24 – Google , ENISA and OWASP initiatives on Secure AI

Securing AI Systems — Defensive Strategies Medium, June 7, 2023 In the ever-expanding field of artificial intelligence (AI), ensuring the security and safety of AI systems has emerged as a critical concern. In the context of AI-based solutions, a comprehensive understanding of the risk landscape is essential. The first paper ...