Cyber Defense eMagazine May Edition for 2022
Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Ethical AI - How is AI Redefining the Insurance Industry?<br />
By Antoine de Langlois, Responsible AI Data Scientist at Zelros<br />
When <strong>Cyber</strong>security meets Artificial Intelligence, companies and organizations have many new<br />
challenges and potential threats to consider. Here are some examples of how AI can help combat a<br />
cyber-attack.<br />
Adversarial attack<br />
In the case of a Vision ML model, tasked to detect a panda, you can modify the input image to fool the<br />
algorithm into predicting a gibbon. While the image remains strictly identifiable as a panda <strong>for</strong> the human<br />
eye. It could fool an autonomous car into mis-identifying a stop sign with a speed limit road sign, with<br />
critical consequences. It can also be developed <strong>for</strong> speech recognition. Here again the sound change<br />
could not be detected by human ears but will fool the speech recognition device<br />
To counter adversarial attacks, companies need to retrain the algorithm to ensure it detects and flags<br />
anomalies by proactively detecting the breaches and retraining the algorithm helps minimize such<br />
attacks. To have a robust model, companies can also “sample with noise” to help prevent a future<br />
adversarial attack.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 80<br />
Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.