article thumbnail

10 things to watch out for with open source gen AI

CIO

Even if you don’t have the training data or programming chops, you can take your favorite open source model, tweak it, and release it under a new name. According to Stanford’s AI Index Report, released in April, 149 foundation models were released in 2023, two-thirds of them open source.

article thumbnail

Easily Exploitable Critical Vulnerabilities Found in Open Source AI/ML Tools 

Ooda Loop

Protect AI reports that 32 security defects were discovered in multiple open source artificial intelligence and machine learning tools over the past few months. Some of the bugs could cause high levels of harm, such as information loss, […]

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Get the Latest on Deepfake Threats, Open Source Risks, AI System Security and Ransomware Gangs

Tenable

Tasked with securing your org’s new AI systems? Plus, open source security experts huddled at a conference this week – find out what they talked about. That’s the topic of the paper “ Securing AI: Similar or Different? Check out a new Google paper with tips and best practices. And much more!

article thumbnail

Qdrant, an open source vector database startup, wants to help AI developers leverage unstructured data

TechCrunch

For many, ChatGPT and the generative AI hype train signals the arrival of artificial intelligence into the mainstream. Just last year, a similar proposition to Qdrant called Pinecone nabbed $28 million , though Zayarni considers Qdrant’s open source foundation as a major selling point for would-be customers.

article thumbnail

Endor Labs Taps ChatGPT to Identify Secure Open Source Software

DevOps.com

Endor Labs has launched DroidGPT, an extension of its software for assessing risks in open source code. DroidGPT integrates the ChatGPT generative artificial intelligence (AI) platform to make it simpler to discover the most secure version of an open source package.

article thumbnail

Cybersecurity Snapshot: 6 Best Practices for Implementing AI Securely and Ethically

Tenable

But how can you ensure you use it securely, responsibly, ethically and in compliance with regulations? Check out best practices, guidelines and tips in this special edition of the Tenable Cybersecurity Snapshot! How can the security team contribute to these efforts? We look at best practices for secure use of AI.

article thumbnail

Cybersecurity Snapshot: Attackers Hack Routers To Hit Critical Infrastructure, as CISA Calls for More Secure Router Design

Tenable

CISA is calling on router makers to improve security, because attackers like Volt Typhoon compromise routers to breach critical infrastructure systems. And a cyber expert calls on universities to beef up security instruction in computer science programs. Meanwhile, data breaches hit an all-time high in the U.S. So said the U.S.