mostviewed
- 
	
			AI SecurityAddressing the Full Stack of AI Concerns: Responsible AI, Trustworthy AI, Secure AI and Safe AI ExplainedAs AI continues to evolve and integrate deeper into societal frameworks, the strategies for its governance, alignment, and security must… Read More »
- 
	
			AI SecurityThe Dual Risks of AI Autonomous Robots: Uncontrollable AI Meets Cyber-Kinetic RisksThe automotive industry has revolutionized manufacturing twice. The first time was in 1913 when Henry Ford introduced a moving assembly… Read More »
- 
	
			AI SecurityFortifying the Future: Cyber-Kinetic Risks in Kingdom of Saudi Arabia’s (KSA) Technological ZeitgeistTo fortify its cyber-kinetic defenses in line with growing digital transformation and infrastructural expansions, Saudi Arabia must adopt a multi-layered… Read More »
- 
	
			Defence.AIMarin’s Statement on AI RiskThe rapid development of AI brings both extraordinary potential and unprecedented risks. AI systems are increasingly demonstrating emergent behaviors, and… Read More »
- 
	
			My PerspectivesAI Oasis: AI’s Role in Saudi Vision 2030In a country that so highly prizes tradition, it is refreshing to see such progressive thinking translated into action. Vision… Read More »
- 
	
			AI SecurityAI Security 101Artificial Intelligence (AI) is no longer just a buzzword; it’s an integral part of our daily lives, powering everything from… Read More »
- 
	
			AI SecurityWhy We Need a Chief AI Security Officer (CAISO)With AI’s breakneck expansion, the distinctions between ‘cybersecurity’ and ‘AI security’ are becoming increasingly pronounced. While both disciplines aim to… Read More »
- 
	
			My PerspectivesSaudi Arabia Vision 2030: Cybersecurity at the Core of the National TransformationIn KSA, where bold development plans include smart cities, smart ports, AI-integrated infrastructure and digital technologies at the core of… Read More »
- 
	
			AI SecurityHow to Defend Neural Networks from Neural Trojan AttacksNeural networks learn from data. They are trained on large datasets to recognize patterns or make decisions. A Trojan attack… Read More »
- 
	
			My PerspectivesWill the Kingdom of Saudi Arabia (KSA) beat Japan to Society 5.0?In April 2016, the Kingdom of Saudi Arabia (KSA) launched Vision 2030, a comprehensive and ambitious long-term development plan aimed… Read More »
- 
	
			AI SecurityModel Fragmentation and What it Means for SecurityModel fragmentation is the phenomenon where a single machine-learning model is not used uniformly across all instances, platforms, or applications.… Read More »
- 
	
			AI SecurityOutsmarting AI with Model EvasionModel Evasion in the context of machine learning for cybersecurity refers to the tactical manipulation of input data, algorithmic processes,… Read More »
- 
	
			AI SecuritySecuring Machine Learning Workflows through Homomorphic EncryptionHomomorphic Encryption has transitioned from being a mathematical curiosity to a linchpin in fortifying machine learning workflows against data vulnerabilities.… Read More »
- 
	
			AI SecurityUnderstanding Data Poisoning: How It Compromises Machine Learning ModelsData poisoning is a targeted form of attack wherein an adversary deliberately manipulates the training data to compromise the efficacy… Read More »
- 
	
			AI SecuritySemantic Adversarial Attacks: When Meaning Gets TwistedSemantic adversarial attacks represent a specialized form of adversarial manipulation where the attacker focuses not on random or arbitrary alterations… Read More »
 
 
 
 
 
 
 
 
 
 
 
 
 
 
