Emerging Tech Security
AI security and safety, cyber-kinetic security, 5G and mIoT security, blockchain and crypto security, and other emerging technology risk domains adjacent to quantum.
-
Quantum Readiness for Mission-Critical Communications (MCC)
Mission-critical communications (MCC) networks are the specialized communication systems used by “blue light” emergency and disaster response services (police, fire, EMS), military units, utilities, and other critical operators to relay vital information when lives or infrastructure are at stake. These…
Read More » -
Understanding Data Poisoning: How It Compromises Machine Learning Models
Data poisoning is a targeted form of attack wherein an adversary deliberately manipulates the training data to compromise the efficacy of machine learning models. The training phase of a machine learning model is particularly vulnerable to this type of attack…
Read More » -
Semantic Adversarial Attacks: When Meaning Gets Twisted
Semantic adversarial attacks represent a specialized form of adversarial manipulation where the attacker focuses not on random or arbitrary alterations to the data but specifically on twisting the semantic meaning or context behind it. Unlike traditional adversarial attacks that often…
Read More » -
The AI Alignment Problem
The AI alignment problem sits at the core of all future predictions of AI’s safety. It describes the complex challenge of ensuring AI systems act in ways that are beneficial and not harmful to humans, aligning AI goals and decision-making…
Read More » -
A (Very) Brief History of AI
As early as the mid-19th century, Charles Babbage and Ada Lovelace created the Analytical Engine, a mechanical general-purpose computer. Lovelace is often credited with the idea of a machine that could manipulate symbols in accordance with rules and that it…
Read More » -
Understanding and Addressing Biases in Machine Learning
While ML offers extensive benefits, it also presents significant challenges, among them, one of the most prominent ones is biases in ML models. Bias in ML refers to systematic errors or influences in a model's predictions that lead to unequal…
Read More » -
Adversarial Attacks: The Hidden Risk in AI Security
Adversarial attacks specifically target the vulnerabilities in AI and ML systems. At a high level, these attacks involve inputting carefully crafted data into an AI system to trick it into making an incorrect decision or classification. For instance, an adversarial…
Read More » -
Gradient-Based Attacks: A Dive into Optimization Exploits
Gradient-based attacks refer to a suite of methods employed by adversaries to exploit the vulnerabilities inherent in ML models, focusing particularly on the optimization processes these models utilize to learn and make predictions. These attacks are called “gradient-based” because they…
Read More » -
How Blockchain Security Differs From Traditional Cybersecurity – 4 – Security Operations (SOC)
This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical for node operators, smart contract developers, and end users. In many ways, Security Operations Center (SOC)…
Read More » -
Introduction to AI-Enabled Disinformation
In recent years, the rise of artificial intelligence (AI) has revolutionized many sectors, bringing about significant advancements in various fields. However, one area where AI has presented a dual-edged sword is in information operations, specifically in the propagation of disinformation.…
Read More » -
The Unseen Dangers of GAN Poisoning in AI
GAN Poisoning is a unique form of adversarial attack aimed at manipulating Generative Adversarial Networks (GANs) during their training phase; unlike traditional cybersecurity threats like data poisoning or adversarial input attacks, which either corrupt training data or trick already-trained models,…
Read More » -
“Magical” Emergent Behaviours in AI: A Security Perspective
Emergent behaviours in AI have left both researchers and practitioners scratching their heads. These are the unexpected quirks and functionalities that pop up in complex AI systems, not because they were explicitly trained to exhibit them, but due to the…
Read More » -
Can we afford to keep ignoring Open RAN security?
I’m skeptical of ‘futurists’. Work closely enough with the development of technology solutions and you’ll know that the only certain thing about the future is that it’s constantly changing. For example, few ‘futurists’ predicted the Covid-19 outbreak that brought the…
Read More » -
How Blockchain Security Differs From Traditional Cybersecurity – 3 – User Security
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security. Check out the first two articles in the series exploring the differences for node operators and application developers. This article explores…
Read More » -
How Blockchain Security Differs From Traditional Cybersecurity – 2 – Smart Contract Developers
This article is the second in a four-part series discussing the differences between traditional IT security / cybersecurity and blockchain security. Check out the first article in the series discussing the differences for node operators. This article focuses on the…
Read More »













