Why VMware’s Tom Gillis Calls APIs ‘the Future of Networking’

'FragAttacks' eavesdropping flaws revealed in all Wi-Fi devices

The state of digital transformation in Indonesia

Law firms are building A.I. expertise as regulation looms
Just because A.I. is an emerging area of law doesn’t mean there aren’t plenty of ways companies can land in legal hot water today using the technology. He says this is particularly true if an algorithm winds up discriminating against people based on race, sex, religion, age, or ability. “It’s astounding to me the extent to which A.I. is already regulated and people are operating in gleeful bliss and ignorance,” he says. Most companies have been lucky so far—enforcement agencies have generally had too many other priorities to take too hard a look at more subtle cases of algorithmic discrimination, such as a chat bot that might steer certain white customers and Black customers to different car insurance deals, Hall says. But he thinks that is about to change—and that many businesses are in for a rude awakening. Working with Georgetown University’s Centre for Security and Emerging Technology and Partnership on A.I., Hall was among the researchers who have helped document 1,200 publicly reported cases of A.I. “system failures” in just the past three years. The consequences have ranged from people being killed to false arrests based on facial recognition systems misidentifying people to individuals being excluded from job interviews.BRD’s Blockset unveils its white-label cryptocurrency wallet for banks

Democratize Machine Learning with Customizable ML Anomalies
Customizable machine learning (ML) based anomalies for Azure Sentinel are now
available for public preview. Security analysts can use anomalies to reduce
investigation and hunting time as well as improve their detections. Typically,
these benefits come at the cost of a high benign positive rate, but Azure
Sentinel’s customizable anomaly models are tuned by our data science team and
trained with the data in your Sentinel workspace to minimize the benign
positive rate, providing out-of-the box value. If security analysts need to
tune them further, however, the process is simple and requires no knowledge of
machine learning. ... A new rule type called “Anomaly” has been added to Azure
Sentinel’s Analytics blade. The customizable anomalies feature provides
built-in anomaly templates for immediate value. Each anomaly template is
backed by an ML model that can process millions of events in your Azure
Sentinel workspace. You don’t need to worry about managing the ML run-time
environment for anomalies because we take care of everything behind the
scenes. In public preview, all built-in anomaly rules are enabled by default
in your workspace.
Most of the tools, including Fawkes, take the same basic approach. They make
tiny changes to an image that are hard to spot with a human eye but throw off
an AI, causing it to misidentify who or what it sees in a photo. This
technique is very close to a kind of adversarial attack, where small
alterations to input data can force deep-learning models to make big mistakes.
Give Fawkes a bunch of selfies and it will add pixel-level perturbations to
the images that stop state-of-the-art facial recognition systems from
identifying who is in the photos. Unlike previous ways of doing this, such as
wearing AI-spoofing face paint, it leaves the images apparently unchanged to
humans. Wenger and her colleagues tested their tool against several widely
used commercial facial recognition systems, including Amazon’s AWS
Rekognition, Microsoft Azure, and Face++, developed by the Chinese company
Megvii Technology. In a small experiment with a data set of 50 images, Fawkes
was 100% effective against all of them, preventing models trained on tweaked
images of people from later recognizing images of those people in fresh
images.
The first step to encouraging more diversity within the cyber security
workforce is representation. Businesses need to look at their teams and
collaborate with their community and industry to create a platform that will
inspire individuals into industries they may not have considered before. For
example, company representatives at events act as role models, and their
individual passion can be a strong inspiration and draw for a wide range of
candidates. For this reason, it’s vital that security and cloud teams – and in
particular members from diverse backgrounds – have a voice on traditional
media and social platforms. Diverse voices should be seen and heard in
newspapers, on corporate blogs, and in broadcast, where they can share insight
into their careers and expertise, encouraging new talent to join the industry
and their business specifically. Similarly, mentorship programmes help
businesses to attract and retain talent. For those moving into the industry,
changing companies, or transitioning into a new role, having a mentor provides
support, the comfort of representation, and showcases their
achievements.
Quote for the day:
"Leadership is absolutely about inspiring action, but it is also about guarding against mis-action." -- Simon Sinek
How to stop AI from recognizing your face in selfies

Agile Transformation: Bringing the Porsche Experience into the Digital Future with SAFe
Agile means, in fact, many things, but above all, it is a shared commitment. What really matters are the underlying values such as openness, self-commitment, focus. Not to forget the main principles behind agile work: customer orientation, embracing change and continuous improvement, empowerment and self-organization, simplicity, and transparency. In other words, what we learned quite early on is the importance to establish not only ambitious goals but also a shared vision across teams. That requires bringing together different goals and building alignment around a common purpose. Furthermore, we have learned that it is important to focus on incremental change. We now focus on a small number of topics and pursue them persistently. Transformation takes time. Lifelong learning also means that change is an ongoing process — it never ends. Sometimes, change may be hard, but we are not alone. It affects many areas outside the Digital Product Organization and it is essential that we take others along on the journey. Finally, it is important to keep in mind that successful and long-lived companies are usually the ones that learn to be agile and stable at the same time.Recruiting and retaining diverse cloud security talent

3 areas of implicitly trusted infrastructure that can lead to supply chain compromises
Once the server a software repository is hosted on is compromised, an attacker can do just about anything with the repositories on that machine if the users of the repository are not using signed git commits. Signing commits works much like with author-signed packages from package repositories but brings that authentication to the individual code change level. To be effective, this requires every user of the repository to sign their commits, which is weighty from a user perspective. PGP is not the most intuitive of tools and will likely require some user training to implement, but it’s a necessary trade-off for security. Signed commits are the one and only way to verify that commits are coming from the original developers. The user training and inconvenience of such an implementation is a necessary inconvenience if you want to prevent malicious commiters masquerading as developers. This would have also made the HTTPS-based commits of the PHP project’s repository immediately suspicious. Signed commits do not, however, alleviate all problems, as a compromised server with a repository on it can allow the attacker to inject themselves into several locations during the commit process.Quote for the day:
"Leadership is absolutely about inspiring action, but it is also about guarding against mis-action." -- Simon Sinek
No comments:
Post a Comment