01.05.2022 Views

Cyber Defense eMagazine May Edition for 2022

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine May Edition for 2022 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ethical AI - How is AI Redefining the Insurance Industry?<br />

By Antoine de Langlois, Responsible AI Data Scientist at Zelros<br />

When <strong>Cyber</strong>security meets Artificial Intelligence, companies and organizations have many new<br />

challenges and potential threats to consider. Here are some examples of how AI can help combat a<br />

cyber-attack.<br />

Adversarial attack<br />

In the case of a Vision ML model, tasked to detect a panda, you can modify the input image to fool the<br />

algorithm into predicting a gibbon. While the image remains strictly identifiable as a panda <strong>for</strong> the human<br />

eye. It could fool an autonomous car into mis-identifying a stop sign with a speed limit road sign, with<br />

critical consequences. It can also be developed <strong>for</strong> speech recognition. Here again the sound change<br />

could not be detected by human ears but will fool the speech recognition device<br />

To counter adversarial attacks, companies need to retrain the algorithm to ensure it detects and flags<br />

anomalies by proactively detecting the breaches and retraining the algorithm helps minimize such<br />

attacks. To have a robust model, companies can also “sample with noise” to help prevent a future<br />

adversarial attack.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>May</strong> <strong>2022</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!