Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E15)

S1/E15: Bonus Episode # 2 – The EU Ninth Framework Programme for Research and Innovation: Horizon Europe

Up
0
Down
Posted in Cybersecurity

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E14)

S1/E14: Bonus Episode – The EU Cybersecurity Resilience Act

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E13)

S1/E13: Wrapping up

Here we are! All good things come to an end. Time to bid farewell…

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E12)

S1/E12: AI: You’d better do no harm

Up
0
Down
Posted in Software Technology

Adversarial Attacks on Machine Learning Models: What Software Developers Need to Know

Machine learning and artificial intelligence have emerged as powerful tools in several domains, bringing huge changes to software development. LLMs are now used by developers to help write code and are integrated into apps and services. Similarly, other machine learning models are commonly integrated into websites and apps, either being developed and trained from scratch using proprietary data, or leveraging third party machine learning tools.

Up
0
Down
Posted in Software Technology

Prompt injection attacks in LLMs and how to defend against them

In recent months, large language models (LLMs) have gained great popularity thanks to their ability to generate human-like text and code, and tools based on them are being implemented in more and more systems. However, with such impressive capabilities comes the potential for abuse and misuse: for instance, when Microsoft originally released Bing Chat, an AI-powered chatbot somewhat similar to OpenAI’s ChatGPT, it didn’t take long until users found ways to break it.

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E11)

S1/E11: The European Union's Artificial Intelligence Act: Let the fight, I mean, the negotiations begin

Welcome to Part 3 of the European Union’s Artificial Intelligence (AI) Act in this blog series!

In this episode I’ll give you hints about the official positions taken by the Council of the European Union (EU), or the EU Council, on one side, and by the European Parliament (EP), on the other side, with respect to the European Commission’s (EC) proposal for the AI Act.

Up
0
Down
Posted in Software Development Lifecycle

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E10)

S1/E10: The European Union’s Artificial Intelligence Act – The EC proposal

Up
0
Down
Posted in Software Technology

Privacy-preserving machine learning

In today's digital age vast amounts of data are constantly being generated and processed, for every action we complete on our devices, and this has made privacy a paramount concern. Indeed, machine learning algorithms thrive on large datasets, and it was often the case that user privacy was ignored for the sake of having more advanced algorithms and models.

Up
0
Down
Posted in Cybersecurity

Defence Against Phishing Attacks

Phishing attacks are a type of cyber attack that involve tricking a victim into divulging sensitive information, such as passwords, usernames, or credit card numbers. There are several different types of phishing attacks, each with its own unique characteristics and methods of operation. In this article, we'll explore the most common types of phishing attacks and how to recognize and avoid them.

Subscribe to Cyber Security