Emerging Tech Security
AI security and safety, cyber-kinetic security, 5G and mIoT security, blockchain and crypto security, and other emerging technology risk domains adjacent to quantum.
-
Mapping Dark Web SIM Swapping Economy
In the U.S. alone, SIM-swapping attacks resulted in $72 million worth of losses last year, four-million dollars more than 2021, according to the Federal Bureau of Investigation. In a 2022 public service announcement, the FBI defined SIM swapping as a…
Read More » -
Cybersecurity Negligence and Personal Liability: What CISOs and Board Members Need to Know
“Could I personally be sued or fined if our company gets breached?” This uneasy question is crossing the minds of many CISOs and board members lately. High-profile cyber incidents and evolving regulations have made it clear that cybersecurity is not…
Read More » -
Verified Crypto Account Listings Proliferate on the Dark Web
Verified crypto-exchange accounts have become a hot commodity on the dark web, with login credentials available for as little as $20, according to May data from threat intelligence firm Privacy Affairs. But the price for verified crypto accounts has been…
Read More » -
AI Oasis: AI’s Role in Saudi Vision 2030
It seems everyone is talking about artificial intelligence (AI). Everyone. From senior executives to school kids, the hype – or dread – around this technology seems to be growing by the day. Much of this excitement, of course, has to…
Read More » -
A Deep Dive Into the ‘Rags to Riches’ Manual for Withdrawing Illicit-Origin Crypto
Annualized data from blockchain forensics provider Chainalysis indicates that crypto-enabled crime has dropped precipitously through the first half of 2023, but cybercriminals are also continuously evolving new cash-out methods to cover their tracks. Chainalysis’s mid-year update found that crypto inflows…
Read More » -
Saudi Arabia Vision 2030: Cybersecurity at the Core of Transformation
Last week, the Saudi Data and Artificial Intelligence Authority (SDAIA) launched a nationwide awareness campaign called “Ask Before”, intended to educate the public about the significance of personal data ahead of the implementation of a new national personal data protection system. Emphasizing…
Read More » -
AI Security 101
Artificial Intelligence (AI) is no longer just a buzzword; it’s an integral part of our daily lives, powering everything from our search for a perfect meme to critical infrastructure. But as Spider-Man’s Uncle Ben wisely said, “With great power comes…
Read More » -
Why We Seriously Need a Chief AI Security Officer (CAISO)
With AI’s breakneck expansion, the distinctions between ‘cybersecurity’ and ‘AI security’ are becoming increasingly pronounced. While both disciplines aim to safeguard digital assets, their focus and the challenges they address diverge in significant ways. Traditional cybersecurity is primarily about defending…
Read More » -
How to Defend Neural Networks from Trojan Attacks
Neural networks learn from data. They are trained on large datasets to recognize patterns or make decisions. A Trojan attack in a neural network typically involves injecting malicious data into this training dataset. This 'poisoned' data is crafted in such…
Read More » -
Will the Kingdom of Saudi Arabia (KSA) beat Japan to Society 5.0?
Ask most people what they remember from 2016 – if they remember anything at all – and there are usually two big events that float to the front of their minds: Britain voted to leave the European Union and the…
Read More » -
Is 5G security being sacrificed at the altar of profit, politics and process?
Homo sapiens is an incredibly adaptable species, arguably the most adaptable ever. But it is also a forgetful one, quick to take things for granted. Many of us can remember when cell phones first emerged, when the internet first became…
Read More » -
Model Fragmentation and What it Means for Security
Model fragmentation is the phenomenon where a single machine-learning model is not used uniformly across all instances, platforms, or applications. Instead, different versions, configurations, or subsets of the model are deployed based on specific needs, constraints, or local optimizations. This…
Read More » -
Outsmarting AI with Model Evasion
Model Evasion in the context of machine learning for cybersecurity refers to the tactical manipulation of input data, algorithmic processes, or outputs to mislead or subvert the intended operations of a machine learning model. In mathematical terms, evasion can be…
Read More » -
AI and Canada: Pioneering Innovation, Searching for Homegrown Success
It’s easy to forget, amid the hype around Silicon Valley’s AI giants, that many of the foundational breakthroughs of modern AI were born in Canada. In fact, two of the three “godfathers of AI” - Yoshua Bengio and Geoffrey Hinton…
Read More » -
Securing Machine Learning Workflows through Homomorphic Encryption
Homomorphic Encryption has transitioned from being a mathematical curiosity to a linchpin in fortifying machine learning workflows against data vulnerabilities. Its complex nature notwithstanding, the unparalleled privacy and security benefits it offers are compelling enough to warrant its growing ubiquity.…
Read More »












