Remove category security
article thumbnail

Meta AI Introduces CyberSecEval 2: A Novel Machine Learning Benchmark to Quantify LLM Security Risks and Capabilities

Marktechpost

Prior works to evaluate LLMs’ security properties include open benchmark frameworks and position papers proposing evaluation criteria. Meta researchers present CYBERSECEVAL 2, a benchmark for assessing LLMs security risks and capabilities, including prompt injection and code interpreter abuse testing.

LLM 124
article thumbnail

Vivek Desai, Chief Technology Officer, North America at RLDatix – Interview Series

Unite.AI

It held great promise, but also raised some questions around workload security. It was very clear early on that traditional methods were a stopgap, and that organizations across the board would need to develop new processes to effectively secure workloads in the cloud.

LLM 147
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR compliance checklist

IBM Journey to AI blog

The only data processing activities exempt from the GDPR are national security or law enforcement activities and purely personal uses of data. The organization takes extra precautions when processing children’s data or special category data. Schools, hospitals and government agencies all fall under GDPR authority.

article thumbnail

Stability AI unveils 12B parameter Stable LM 2 model and updated 1.6B variant

AI News

Gemma, and Mistral, Stable LM 2 12B offers solid results when tested on zero-shot and few-shot tasks across general benchmarks outlined in the Open LLM leaderboard: With this new release, Stability AI extends the StableLM 2 family into the 12B category, providing an open and transparent model without compromising power and accuracy.

Big Data 255
article thumbnail

4 Key Steps in Preprocessing Data for Machine Learning

Aiiot Talk

Data Security Considerations in Preprocessing “Safeguarding data privacy during preprocessing — especially when handling sensitive information — is necessary.” Always anonymize or pseudonymize personal data, implement access controls and encrypt data to adhere to AI projects’ data security regulations and ethical guidelines.

article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Journey to AI blog

The only processing operations exempt from the GDPR are national security and law enforcement activities and purely personal uses of data. Identify and protect special category data When inventorying data, organizations should make a note of any especially sensitive data that requires extra protection.

article thumbnail

Would Your Company Pass a Cybersecurity Polygraph Test?

Unite.AI

IBM Security's research pinpoints the average cost of a data breach estimated at around $4.45 Here's a closer look at what this assessment would typically cover: Secure Infrastructure The bedrock of cybersecurity is having a fortified infrastructure. Make sure they are relevant and in sync with modern best practices.