[1] In the midst of the heated debate about
AI sentience, conscious machines and artificial general intelligence, Yann LeCun, chief AI scientist at Meta, published a blueprint for creating "autonomous machine intelligence."
LeCun has compiled his ideas in a paper that draws inspiration from
progress in machine learning, robotics, neuroscience and cognitive science. He lays out a roadmap for creating AI that can model and understand the world, reason and plan to do tasks on different timescales.
One element of LeCun's vision is a modular structure of different components, inspired by various parts of the brain. This is a break from the popular approach in deep learning, where a single model is trained end to end.
>> Read more. [2] Oak9, a developer-first
infrastructure-as-code (IaC) security provider, says that enterprises have begun to adopt the concept of treating applications as code.
Policy-as-code tools like HashiCorp Sentinel are designed to define
governance or policy principles. Oak9's platform is powered by its proprietary Security as Code (SaC) tool, which is designed to assess changes to
cloud-native infrastructure — applying the right security against SaC blueprints to risk-appropriately secure a cloud application's architecture.
Oak9, claims that its platform accelerates the delivery of cloud-native applications while offering security to identify and address any vulnerabilities. The platform is designed to tell users where security vulnerabilities live in an organization's cloud, how critical they are, why they exist and how to
remediate them. With the tool, organizations have the capability to apply the security fix across their cloud infrastructure.
>> Read more. [3] Today, data security provider, Titaniam, released the State of Data Exfiltration & Extortion Report, which revealed that while over 70% of organizations have an existing set of prevention and detection solutions, nearly 40% have been hit with ransomware attacks in the last year.
The findings suggest that traditional data security tools, like secure backup and recovery tools, solutions that offer encryption at rest and in transit, tokenization and data masking, are failing to protect enterprises' data against ransomware threats 60% of the time.
Above all, the research highlights that organizations cannot afford to be reliant on traditional data security tools alone to defend against data exfiltration and double extortion ransomware attacks, they need to be able to encrypt data-in-use to stop malicious actors in their tracks.
>> Read more.
No comments:
Post a Comment