mostviewed
-
AI Security
Addressing the Full Stack of AI Concerns: Responsible AI, Trustworthy AI, Secure AI and Safe AI Explained
As AI continues to evolve and integrate deeper into societal frameworks, the strategies for its governance, alignment, and security must…
Read More » -
AI Security
The Dual Risks of AI Autonomous Robots: Uncontrollable AI Meets Cyber-Kinetic Risks
The automotive industry has revolutionized manufacturing twice. The first time was in 1913 when Henry Ford introduced a moving assembly…
Read More » -
AI Security
Fortifying the Future: Cyber-Kinetic Risks in Kingdom of Saudi Arabia’s (KSA) Technological Zeitgeist
It’s a good time to be in construction, especially if you happen to operate in Saudi Arabia. Even in the…
Read More » -
Defence.AI
Marin’s Statement on AI Risk
The rapid development of AI brings both extraordinary potential and unprecedented risks. AI systems are increasingly demonstrating emergent behaviors, and…
Read More » -
My Perspectives
AI Oasis: AI’s Role in Saudi Vision 2030
In a country that so highly prizes tradition, it is refreshing to see such progressive thinking translated into action. Vision…
Read More » -
AI Security
AI Security 101
Artificial Intelligence (AI) is no longer just a buzzword; it’s an integral part of our daily lives, powering everything from…
Read More » -
AI Security
Why We Need a Chief AI Security Officer (CAISO)
With AI’s breakneck expansion, the distinctions between ‘cybersecurity’ and ‘AI security’ are becoming increasingly pronounced. While both disciplines aim to…
Read More » -
My Perspectives
Saudi Arabia Vision 2030: Cybersecurity at the Core of the National Transformation
In KSA, where bold development plans include smart cities, smart ports, AI-integrated infrastructure and digital technologies at the core of…
Read More » -
AI Security
How to Defend Neural Networks from Neural Trojan Attacks
Neural networks learn from data. They are trained on large datasets to recognize patterns or make decisions. A Trojan attack…
Read More » -
My Perspectives
Will the Kingdom of Saudi Arabia (KSA) beat Japan to Society 5.0?
In April 2016, the Kingdom of Saudi Arabia (KSA) launched Vision 2030, a comprehensive and ambitious long-term development plan aimed…
Read More » -
AI Security
Model Fragmentation and What it Means for Security
Model fragmentation is the phenomenon where a single machine-learning model is not used uniformly across all instances, platforms, or applications.…
Read More » -
AI Security
Outsmarting AI with Model Evasion
Model Evasion in the context of machine learning for cybersecurity refers to the tactical manipulation of input data, algorithmic processes,…
Read More » -
AI Security
Securing Machine Learning Workflows through Homomorphic Encryption
Homomorphic Encryption has transitioned from being a mathematical curiosity to a linchpin in fortifying machine learning workflows against data vulnerabilities.…
Read More » -
AI Security
Understanding Data Poisoning: How It Compromises Machine Learning Models
Data poisoning is a targeted form of attack wherein an adversary deliberately manipulates the training data to compromise the efficacy…
Read More » -
AI Security
Semantic Adversarial Attacks: When Meaning Gets Twisted
Semantic adversarial attacks represent a specialized form of adversarial manipulation where the attacker focuses not on random or arbitrary alterations…
Read More »