Menu

Blog

Archive for the ‘security’ category: Page 11

May 11, 2024

State of Security 2024: The Race to Harness AI

Posted by in categories: robotics/AI, security

In 2024, security teams face new opportunities and obstacles, such as escalating geopolitical tensions, stricter compliance mandates, and the rise of generative AI — which will transform the industry in new and unexpected ways.

In the State of Security 2024: The Race to Harness AI, we identify organizations that are pulling ahead of their peers and share key characteristics and findings.

May 7, 2024

The problem of AI identity

Posted by in categories: robotics/AI, security

The problem of personal identity is a longstanding philosophical topic albeit without final consensus. In this article the somewhat similar problem of AI identity is discussed, which has not gained much traction yet, although this investigation is increasingly relevant for different fields, such as ownership issues, personhood of AI, AI welfare, brain–machine interfaces, the distinction between singletons and multi-agent systems as well as to potentially support finding a solution to the problem of personal identity. The AI identity problem analyses the criteria for two AIs to be considered the same at different points in time. Two approaches to tackle the problem are proposed: One is based on the personal identity problem and the concept of computational irreducibility, while the other one applies multi-factor authentication to the AI identity problem. Also, a range of scenarios is examined regarding AI identity, such as replication, fission, fusion, switch off, resurrection, change of hardware, transition from non-sentient to sentient, journey to the past, offspring and identity change.

Like Recommend

May 5, 2024

Dr. Jaime Yassif, Ph.D. — VP, Global Biological Policy and Programs, Nuclear Threat Initiative (NTI)

Posted by in categories: biological, biotech/medical, health, policy, security, surveillance

Working To Reduce Global Catastrophic Biological Risks — Dr. Jaime Yassif, Ph.D. — VP, Global Biological Policy and Programs, Nuclear Threat Initiative.


Dr. Jaime Yassif, Ph.D. serves as Vice President of Global Biological Policy and Programs, at the Nuclear Threat Initiative (https://www.nti.org/about/people/jaim…) where she oversees work to reduce global catastrophic biological risks, strengthen biosecurity and pandemic preparedness, and drives progress in advancing global health security.

Continue reading “Dr. Jaime Yassif, Ph.D. — VP, Global Biological Policy and Programs, Nuclear Threat Initiative (NTI)” »

Apr 30, 2024

Large Language Models Set To Transform The Observability Market Forever

Posted by in categories: business, economics, robotics/AI, security

The platform’s ability to interface with a variety of data sources and observability tools makes it a versatile solution for businesses operating in diverse IT environments, whether on-premises, in the cloud, or in hybrid settings. By serving as an intelligence layer that rationalizes data from multiple observability and infrastructure sources, Flip AI simplifies the workload for IT operations teams and supports more efficient operational practices.

This innovative use of LLMs for operational efficiency in IT environments presents a significant advancement in observability, offering enterprises a powerful tool to enhance system reliability and performance while reducing the economic impact of downtime.

As LLMs continue to evolve, their integration into observability tools is transforming the landscape of infrastructure and workload observability. The immediate benefits of improved performance monitoring and security are just the beginning.

Apr 28, 2024

Satya Nadella to Sundar Pichai: 22 top executives join AI advisory board in the US

Posted by in categories: robotics/AI, security

Microsoft, Alphabet, OpenAI, Nvidia CEOs join US advisory board to advise on protecting critical infrastructure from AI threats. Board aims to prevent AI-related disruptions to national security and public safety.

Apr 26, 2024

Almost every Chinese keyboard app has a security flaw that reveals what users type

Posted by in categories: encryption, security

An encryption loophole in these apps leaves nearly a billion people vulnerable to eavesdropping.

Apr 25, 2024

What Was There Before the Big Bang? 3 Good Hypotheses!

Posted by in categories: cosmology, mathematics, security

Support this channel: Sign up for ESET Home internet security for FREE: https://www.eset.com/us/protecting-ar
ESET is sponsoring the STARMUS festival in Bratislava, Slovakia May 12–17, 2024: https://www.starmus.com/

TALK TO ME on Patreon:
/ arvinash.

Continue reading “What Was There Before the Big Bang? 3 Good Hypotheses!” »

Apr 25, 2024

Space Age Security: How Satellites Could Extend Quantum Encryption Globally

Posted by in categories: computing, encryption, engineering, internet, quantum physics, satellites, security

How can we guarantee that data sent over the internet is only accessible to its intended recipient? Currently, our data is secured using encryption methods based on the premise that factoring large numbers is a complex task. However, as quantum computing advances, these encryption techniques may become vulnerable and potentially ineffective in the future.

Encryption by means of physical laws

Tobias Vogl, a professor of Quantum Communication Systems Engineering, is working on an encryption process that relies on principles of physics. “Security will be based on the information being encoded into individual light particles and then transmitted. The laws of physics do not permit this information to be extracted or copied. When the information is intercepted, the light particles change their characteristics. Because we can measure these state changes, any attempt to intercept the transmitted data will be recognized immediately, regardless of future advances in technology,” says Tobias Vogl.

Apr 23, 2024

Navigating The Generative AI Divide: Open-Source Vs. Closed-Source Solutions

Posted by in categories: information science, robotics/AI, security

If you’re considering how your organization can use this revolutionary technology, one of the choices that have to be made is whether to go with open-source or closed-source (proprietary) tools, models and algorithms.

Why is this decision important? Well, each option offers advantages and disadvantages when it comes to customization, scalability, support and security.

In this article, we’ll explore the key differences as well as the pros and cons of each approach, as well as explain the factors that need to be considered when deciding which is right for your organization.

Apr 23, 2024

A National Security Insider Does the Math on the Dangers of AI

Posted by in categories: biotech/medical, government, health, internet, policy, robotics/AI, security

Jason Matheny is a delight to speak with, provided you’re up for a lengthy conversation about potential technological and biomedical catastrophe.

Now CEO and president of Rand Corporation, Matheny has built a career out of thinking about such gloomy scenarios. An economist by training with a focus on public health, he dived into the worlds of pharmaceutical development and cultivated meat before turning his attention to national security.

As director of Intelligence Advanced Research Projects Activity, the US intelligence community’s research agency, he pushed for more attention to the dangers of biological weapons and badly designed artificial intelligence. In 2021, Matheny was tapped to be President Biden’s senior adviser on technology and national security issues. And then, in July of last year, he became CEO and president of Rand, the oldest nonprofit think tank in the US, which has shaped government policy on nuclear strategy, the Vietnam War, and the development of the internet.

Page 11 of 145First89101112131415Last