550 Results for:black box

  • Sort by: 

Data is not neutral

By Brian McKenna 06 May 2021

This is a guest blogpost by Triveni Gandhi, Senior Data Scientist, Dataiku We like to think of data and numbers as indisputable, but the reality is that every piece of information is a product of ... Read More

Cisco emerging tech VP plans for API security, observability

By Beth Pariseau 12 Nov 2021

Vijoy Pandey, head of Cisco's emerging technology and incubation group, charts a long-term roadmap for application-level networking from cloud to the edge. Read More

Who is responsible for integration testing?

By Gerie Owen 30 Jun 2021

It's not always clear who is responsible for the integration testing of those new application components. Let's sort through the confusion. Read More

How CI/CD pipelines are putting enterprise networks at risk

By Rob Wright 11 Aug 2022

At Black Hat USA 2022, NCC Group researchers demonstrated how threat actors can compromise CI/CD pipelines and break out into enterprise networks and cloud environments. Read More

Remote device management of connected robots

By Sachin Kurlekar 29 Oct 2019

Robot original equipment manufacturers and solution providers need to prioritize and build a scalable remote management solution that includes core functional features, security and additional ... Read More

IBM interprets machine models with AI Explainability kit

By Darryl K. Taft 09 Aug 2019

IBM's open source AI Explainability 360 toolkit packages algorithms and training examples to help humans better understand the decision-making process of machine learning models. Read More

Security Think Tank: Poor training is worse than no training at all

By Ellie Hurst, Mike Gillespie 08 Feb 2023

Bad security training is a betrayal of users, a security risk, and ultimately a waste of money, but there are some reasons to be optimistic about the future, say Mike Gillespie and Ellie Hurst of Advent IM Read More

Twitter investigates image cropping algorithm for racial bias

By Sebastian Klovig Skelton 22 Sep 2020

The algorithm’s consistent favouring of white faces in image previews has forced the company to investigate it for racial bias Read More

Wiz warns of exposed multi-tenant apps in Azure AD

By Rob Wright 09 Aug 2023

During a Black Hat USA 2023 session, a Wiz researcher explained how a common misconfiguration in Azure Active Directory led to the exposure of nearly 1,300 applications. Read More

CI/CD series - Confluent: Events provide an 'in-built primitive' for continuous coding

By Adrian Bridgwater 10 Dec 2019

This is a guest post for the Computer Weekly Developer Network in our Continuous Integration (CI) & Continuous Delivery (CD) series. This contribution is written by Neil Avery, lead ... Read More