Rob TruesdellforPangea Blogpangea.cloud·Jan 7, 2025To See AI Security’s Future, Look to Network Security’s PastIntro: Analogies Network security back in the 1990’s through the mid-2010’s was a very exciting time where user connectivity rapidly evolved, creating tons of vulnerabilities and exploit techniques that all happened over the network and internet. Thi...27 readsnetwork security
Valerevalere.hashnode.dev·Jan 7, 2025The Competitive Edge in AI Lies in Your Data and Integration Strategy ValereBy: Logan Reilly In the AI-powered landscape, the allure of groundbreaking algorithms and shiny new technologies often steals the spotlight. But as the industry matures, a critical truth is emerging; your data, and how well your AI system integrates ...AI Systems
Valerevalere.hashnode.dev·Jan 2, 2025How AI Protects Your Health Data: A Look into Privacy and Security in HealthcareYour most personal health information, ranging from medications, diagnoses, doctor notes, are all becoming digitized, making healthcare faster, smarter, and more accessible than ever. But here’s the catch; as this data goes digital, the risks grow to...AI in Healthcare,
Amit Sidesamitsides.hashnode.dev·Nov 13, 2024AI & Cyber Security: Exploiting Insights from High-Dimensional Vectors SpacesIntroduction ( Quick note on Article focus: not on the HOW vector embeddings are generated but the WHAT capabilities of these representations per se in cybersecurity) Many modern machine learning and deep learning algorithms, such as neural networks,...#cybersecurity
Nagen Kthinkboundlessai.hashnode.dev·Nov 5, 2024Securing Large Language Models: An Overview of Common Security PracticesWith the explosion of Large Language Models (LLMs) like GPT and BERT, these tools are now everywhere—from customer service chatbots to complex automation tasks. But as powerful as LLMs are, they’re also packed with vulnerabilities that can be exploit...AI
Darshan Patildarshan-ptl.hashnode.dev·Sep 23, 2024AI-powered patching: the future of automated vulnerability fixes - Research Paper NotesHow has Google managed to fix 15% of its sanitizer bugs in the code using AI?As AI continues to improve rapidly, it has also developed the ability to find security bugs in the code, every time it finds a vulnerability, its as opportunity to fix. Lets...29 readspatching
John GambleforPangea Blogpangea.cloud·Sep 19, 2024Where AI-Powered Software is Going, We Need Secure, Paved RoadsDo you remember when and where you first used an AI-powered product that caused you to question reality? I do. In the spring of 2022, I tested a synthetic text-to-voice app that was so uncannily realistic that I briefly questioned if it was truly AI ...201 readsAI
Rosecurifylog.rosecurify.com·Sep 8, 2024Seclog - #90"Never let your enemy know your next move, especially if it's turning the router off and on again." - The Art of Cyber War 📚 SecMisc Living Off the Living Off the Land | LOLOL - A resource for living off the land techniques - Read More shell.how ...seclogseclog
Christopher Akintoyechristopher-akintoye.hashnode.dev·Aug 20, 2024The Rise of AI-Powered Cybersecurity Threats:Introduction The field of cybersecurity changes daily in the current superconnected world. In today's rapidly changing times, with advancing technology, there is an equal advance in the methods and measures used by cybercriminals to rob businesses bl...2 likes#cybersecurity
Abhiramcloudbuddy.hashnode.dev·Jul 19, 2024Generative AI and Cloud Security Orchestration: Conducting the Security SymphonyThe cloud has revolutionized how businesses operate, offering unparalleled scalability, agility, and cost-effectiveness. However, this digital haven comes with a significant responsibility: security. Securing cloud environments is a complex task, req...cloud security