When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Cybersecurityhas long used machine learning techniques, primarily in classifying files,emailsand other content as good or bad.

One of the most insidious threats as a result of this isdatapoisoning.

An AI-powered phone mockup

CTO and Head of Strategic Business for Asia Pacific at Forcepoint.

This applies to those training their own models, or consuming models from other vendors and platforms.

In response to these concerns, many national regulators have published guidance for secure development of generative AI.

Within data science circles, there are some differences in the way attacks are categorized and classified.

For example, you might have a classifier that detects malware.

A grey-box attack also exists and falls somewhere in the middle.

One way of achieving this is to be more diligent about the databases being used to train AI models.

Controlling who has access to training data sets is also crucial in preventing unauthorized manipulation of data.

We’ve featured the best encryption software.

The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.

If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro