550 Results for:black box
- Sort by:
Data is not neutral
06 May 2021This is a guest blogpost by Triveni Gandhi, Senior Data Scientist, Dataiku We like to think of data and numbers as indisputable, but the reality is that every piece of information is a product of ... Read More
Cisco emerging tech VP plans for API security, observability
12 Nov 2021Vijoy Pandey, head of Cisco's emerging technology and incubation group, charts a long-term roadmap for application-level networking from cloud to the edge. Read More
Who is responsible for integration testing?
30 Jun 2021It's not always clear who is responsible for the integration testing of those new application components. Let's sort through the confusion. Read More
How CI/CD pipelines are putting enterprise networks at risk
11 Aug 2022At Black Hat USA 2022, NCC Group researchers demonstrated how threat actors can compromise CI/CD pipelines and break out into enterprise networks and cloud environments. Read More
Remote device management of connected robots
29 Oct 2019Robot original equipment manufacturers and solution providers need to prioritize and build a scalable remote management solution that includes core functional features, security and additional ... Read More
IBM interprets machine models with AI Explainability kit
09 Aug 2019IBM's open source AI Explainability 360 toolkit packages algorithms and training examples to help humans better understand the decision-making process of machine learning models. Read More
Security Think Tank: Poor training is worse than no training at all
08 Feb 2023Bad security training is a betrayal of users, a security risk, and ultimately a waste of money, but there are some reasons to be optimistic about the future, say Mike Gillespie and Ellie Hurst of Advent IM Read More
Twitter investigates image cropping algorithm for racial bias
22 Sep 2020The algorithm’s consistent favouring of white faces in image previews has forced the company to investigate it for racial bias Read More
Wiz warns of exposed multi-tenant apps in Azure AD
09 Aug 2023During a Black Hat USA 2023 session, a Wiz researcher explained how a common misconfiguration in Azure Active Directory led to the exposure of nearly 1,300 applications. Read More
CI/CD series - Confluent: Events provide an 'in-built primitive' for continuous coding
10 Dec 2019This is a guest post for the Computer Weekly Developer Network in our Continuous Integration (CI) & Continuous Delivery (CD) series. This contribution is written by Neil Avery, lead ... Read More