AI Missteps Could Unravel Global Peace and Security#AI#International#Security#Education#Criticism·spectrum.ieee.org·Jul 22, 2024AI Missteps Could Unravel Global Peace and Security
A Real Risk for Artificial Intelligence#AI#Security#Cybersecurity#Risk#Strategic Analysis·csis.org·Jun 11, 2024A Real Risk for Artificial Intelligence
Securing Research Infrastructure for Advanced AI | OpenAI#Research#Security#OpenAI·openai.com·Jun 6, 2024Securing Research Infrastructure for Advanced AI | OpenAI
ASML and TSMC can disable chip machines if China invades Taiwan#Manufacturing#Hardware#Security#TSMC·finance.yahoo.com·May 22, 2024ASML and TSMC can disable chip machines if China invades Taiwan
Exclusive | U.S. Fears Undersea Cables Are Vulnerable to Espionage From Chinese Repair Ships#Oceanography#Internet#Security·wsj.com·May 19, 2024Exclusive | U.S. Fears Undersea Cables Are Vulnerable to Espionage From Chinese Repair Ships
Things I (Do and Don't) Worry About: Global Internet#Internet#Security·mailchi.mp·Apr 22, 2024Things I (Do and Don't) Worry About: Global Internet
Building an early warning system for LLM-aided biological threat creation#Early Warning Signals#Large Language Models#Biology#Security#Paper#OpenAI·openai.com·Feb 1, 2024Building an early warning system for LLM-aided biological threat creation
Etching AI Controls Into Silicon Could Keep Doomsday at Bay#AI#Hardware#Security·wired.com·Jan 25, 2024Etching AI Controls Into Silicon Could Keep Doomsday at Bay
5G/6G Technology and the Future of Global Security#5G#Security#6G#FCC·youtube.com·Dec 12, 20235G/6G Technology and the Future of Global Security
The State of AI Security#Cohere#Large Language Models#Security·txt.cohere.com·Dec 11, 2023The State of AI Security
Scalable Extraction of Training Data from (Production) Language Models#Privacy#Security#ChatGPT#Paper#PDF·arxiv.org·Nov 30, 2023Scalable Extraction of Training Data from (Production) Language Models
US, Britain, other countries ink agreement to make AI 'secure by design'#Security#AI·reuters.com·Nov 27, 2023US, Britain, other countries ink agreement to make AI 'secure by design'
Will releasing the weights of large language models grant widespread access to pandemic agents?#Foundation Models#Security#Paper#PDF·arxiv.org·Oct 31, 2023Will releasing the weights of large language models grant widespread access to pandemic agents?
James Bamford -Spyfail: Foreign Spies, Moles, Saboteurs, & Collapse of America’s Counterintelligence#History#Government#Security#NSA#FBI#Book·youtube.com·Oct 7, 2023James Bamford -Spyfail: Foreign Spies, Moles, Saboteurs, & Collapse of America’s Counterintelligence
Allied Perspectives on Semiconductor Export Controls#Government#Economics#Strategic Analysis#Regulation#Security·youtube.com·Oct 7, 2023Allied Perspectives on Semiconductor Export Controls
Commentary: TSA faces ethical limits in use of AI. But work to improve the technology must persist#Ethics#Criticism#Transportation#Security#TSA#AI·yakimaherald.com·Nov 28, 2022Commentary: TSA faces ethical limits in use of AI. But work to improve the technology must persist
Announcing KataOS and Sparrow#Operating System#Security#Opensource#Google·opensource.googleblog.com·Oct 18, 2022Announcing KataOS and Sparrow
US bans export of tech used in 3nm chip production#Security#Regulation#Hardware·theregister.com·Aug 16, 2022US bans export of tech used in 3nm chip production
Xi's New Global Security Initiative#China#Security#Trends·youtube.com·Jul 16, 2022Xi's New Global Security Initiative
MIT researchers uncover ‘unpatchable’ flaw in Apple M1 chips – TechCrunch#Hardware#Security#Apple#Criticism·techcrunch.com·Jun 12, 2022MIT researchers uncover ‘unpatchable’ flaw in Apple M1 chips – TechCrunch
Autonomous robots used in hundreds of hospitals at risk of remote hijacks – TechCrunch#Robotics#Security#Criticism·techcrunch.com·Apr 13, 2022Autonomous robots used in hundreds of hospitals at risk of remote hijacks – TechCrunch
Cybersecurity Considerations for Data Localization Regulation#Localization#Regulation#Privacy#Safety#Security#Cybersecurity·youtube.com·Mar 14, 2022Cybersecurity Considerations for Data Localization Regulation
MIT Security Studies Program - YouTube#Security#Video·youtube.com·Mar 1, 2022MIT Security Studies Program - YouTube
Attacks from within seen as a growing threat to elections#Elections#Security·apnews.com·Feb 25, 2022Attacks from within seen as a growing threat to elections
Starr Forum: The Russian-Ukrainian Conflict: A prologue to WWIII or another frozen conflict?#Ukraine#Russia#Security#History·youtube.com·Feb 8, 2022Starr Forum: The Russian-Ukrainian Conflict: A prologue to WWIII or another frozen conflict?
Meet the NSA spies shaping the future#Research#Government#Security·technologyreview.com·Feb 1, 2022Meet the NSA spies shaping the future
DoD Announces the Establishment of the Airborne Object Identification#Defense#Space#Intelligence#Security·defense.gov·Nov 24, 2021DoD Announces the Establishment of the Airborne Object Identification