Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

AI Biases: Why Achieving Beneficial AI is Challenging

In this video, we delve into the complex issue of AI biases and the challenges they pose in creating a truly beneficial AI system. Join us as we explore the diverse perspectives surrounding the selection of biases in AI models, which often results in different representative AIs even within the same country. We discuss how individuals seek to have their own biases reflected in the AI models they use, or criticize them for perceived biases, highlighting the irony in contrasting approaches between countries like China and other nations. Moreover, we shed light on the elusive quest for objective determination of what's best for the majority, emphasizing the absence of a universally accepted method.

Rise of AI in Cybercrime: How ChatGPT is revolutionizing ransomware attacks and what your business can do

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. OpenAI's flagship product, ChatGPT, has dominated the news cycle since its unveiling in November 2022. In only a few months, ChatGPT became the fastest-growing consumer app in internet history, reaching 100 million users as 2023 began.

Cracking the Code of AI Decision Making: Harnessing the Power of SHAP Values

Despite the race to integrate artificial intelligence (AI) and machine learning (ML) into business systems and processes, the crucial issue of comprehending and articulating the decision-making process of these models is often ignored. Although machine learning is a valuable tool for uncovering pertinent information from vast amounts of data, it is essential to ensure the relevance, accuracy and reliability of this information.

Salt Announces Bi-directional Integration with Wiz!

We have exciting news to share! Salt Security is building a bi-directional integration with the Wiz cloud security platform! With this announcement, Salt becomes the first API security vendor to build a two-way integration with Wiz, giving Wiz customers the deepest and most actionable insights into API behaviors – all within Wiz’s comprehensive cloud security platform.

Enhancing Mobile App Security through Sandboxing & Isolation

Security Testing is a crucial step in the application development process. So, how about we say you can have a dedicated environment to test your app for potential threats such that the attached malware cannot spread, access, or modify the rest of your system's files, resources, and settings? Pretty lucrative, right? Application Sandbox and isolation technique is the holy grail of application security.

Forrester: AI, Cloud Computing, and Geopolitics are Emerging Cyberthreats in 2023

Wouldn’t it be great if your cybersecurity strategy only had to focus on just a few threats? Sigh… if only life were that easy. But new predictions for this year’s most prevalent cyber threats from analyst firm Forrester should help focus your efforts.. According to their newly released Top Cybersecurity Threats in 2023 (client access required), there are five threats to be concerned about.

Protecting GraphQL APIs from malicious queries

Starting today, Cloudflare’s API Gateway can protect GraphQL APIs against malicious requests that may cause a denial of service to the origin. In particular, API Gateway will now protect against two of the most common GraphQL abuse vectors: deeply nested queries and queries that request more information than they should.

Cloud Security Assessment

Cloud security is the practice of protecting data, applications, and infrastructure that reside on cloud computing platforms. This includes Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and other public and private cloud services. It involves implementing security protocols such as encryption, authentication methods, firewalls and access control to help protect the data and applications that are hosted on cloud servers.

Snyk integrates with AWS Security Hub to automate security remediation workflows

AWS Security Hub is a cloud security posture management platform (CSPM) that automates security best practice checks, aggregates security alerts, and understands your overall security posture across different AWS accounts. AWS Security Hub ingests security findings from other security services like Amazon GuardDuty, Amazon Inspector, Amazon Macie, AWS IAM, and AWS Firewall Manager — as well as findings from partners like Snyk.