Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
AUSTIN, Texas, Aug. 23, 2022
HiddenLayer's Synaptic Adversarial Intelligence (SAI) team will explore and uncover the ML/AI threat landscape
AUSTIN, Texas, Aug. 23, 2022 /PRNewswire/ -- HiddenLayer, the developer of a unique security platform that safeguards the machine learning models enterprise organizations use behind their most important products, today announced the formation of its Synaptic Adversarial Intelligence (SAI) team to raise awareness surrounding the threats facing machine learning (ML) and artificial intelligence (AI) systems.
The SAI's primary mission is to educate data scientists, MLDevOps teams, and cyber security professionals on how to evaluate the vulnerabilities and risks associated with ML/AI so they can make more security-conscious implementations and deployments. The insights gathered by the SAI team are leveraged to conduct risk assessments and generate intelligence reports that expose the adversarial ML threat landscape. Collectively, the multidisciplinary cyber security experts and data scientists have many decades of experience in cyber security and deep backgrounds in malware detection, threat intelligence, reverse engineering, incident response, digital forensics, and adversarial machine learning.
Until recently, most adversarial ML/AI research has focused on the mathematical aspect, making algorithms more robust in handling malicious input. Now security researchers are increasingly exploring ML algorithms and how models are developed, maintained, packaged, and deployed, hunting for weaknesses and vulnerabilities across the broader software ecosystem. They have uncovered a number of new attack techniques and, in turn, developed a greater understanding of how practical attacks are performed against real-world ML implementations.
"Alongside our commitment to increasing awareness of ML security, we will also actively assist in the development of countermeasures to thwart ML adversaries through the monitoring of deployed models, as well as providing mechanisms to allow defenders to respond to attacks," said Tom Bonner, Senior Director of Adversarial Machine Learning Research at HiddenLayer. "There has been a tremendous effort from several organizations, such as MITRE and NIST, to better understand and quantify the risks associated with ML/AI. We look forward to working alongside these industry leaders to broaden the pool of knowledge, define threat models, drive policy and regulation, and most critically, prevent attacks."
Please keep an eye on Twitter and LinkedIn where SAI team members will regularly share their insights into adversarial machine learning and provide recommendations on how organizations can harden their security postures.
HiddenLayer helps enterprises safeguard the machine learning models behind their most important products with a comprehensive security platform. Only HiddenLayer offers turnkey AI/ML security that does not add unnecessary complexity to models and does not require access to raw data and algorithms. Founded in March of 2022 by experienced security and ML professionals, HiddenLayer is based in Austin, Texas, and is backed by cybersecurity investment specialist firm Ten Eleven Ventures. For more information, visit www.hiddenlayer.com and follow us on LinkedIn or Twitter.
Media Contact:
Rachel Kaseroff
415-341-5625
Rachel@RJKCommunications.net
View original content to download multimedia:https://www.prnewswire.com/news-releases/hiddenlayer-creates-a-threat-intelligence-team-focused-on-thwarting-ml-attacks-301610874.html
SOURCE HiddenLayer
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs