Enveil enables organizations to securely train machine learning models - Help Net Security

By allowing customers to leverage Trusted Execution Environments (TEEs) for secure and private model training and evaluation — in addition to existing homomorphic encryption and secure multiparty compute-based offerings — Enveil expands its Secure AI capabilities and solidifies the company’s position as the provider of enterprise-ready solutions powered by Privacy Enhancing Technologies. The core pillars of the PETs category — homomorphic encryption, secure multiparty computation, and trusted execution environments — each have different strengths, which is why Enveil’s core focus is on enabling Secure AI in a manner that successfully addresses customer pain points using the most effective combination of PETs. At its core, Enveil’s ZeroReveal solutions change the paradigm of how and where organizations can leverage data to unlock value by ensuring the content of the search, analytic, or machine learning model — and its corresponding results — are never exposed. In addition to the new TEE offering, users can opt to leverage the homomorphic encryption (HE) and secure multiparty computation (SMPC) capabilities of Enveil’s ZeroReveal ML software solution. As a transformative family of technologies that protect data while it’s being used or processed (Data in Use), Privacy Enhancing Technologies (PETs) uniquely enable users to securely and privately unlock value from data. TEEs are hardware-based, secure enclaves that provide data users with a trusted environment where data can be securely processed, protecting the usage of data. Enveil announced the expansion of the core technologies supported by its ZeroReveal Machine Learning product, an enhancement that will further broaden and diversify the range of customer-driven use cases the solution can address.

This Cyber News was published on www.helpnetsecurity.com. Publication date: Wed, 02 Oct 2024 07:43:05 +0000


Cyber News related to Enveil enables organizations to securely train machine learning models - Help Net Security

Enveil enables organizations to securely train machine learning models - Help Net Security - By allowing customers to leverage Trusted Execution Environments (TEEs) for secure and private model training and evaluation — in addition to existing homomorphic encryption and secure multiparty compute-based offerings — Enveil expands its ...
4 months ago Helpnetsecurity.com
How machine learning helps us hunt threats | Securelist - In this post, we will share our experience hunting for new threats by processing Kaspersky Security Network (KSN) global threat data with ML tools to identify subtle new Indicators of Compromise (IoCs). The model can process and learn from millions ...
4 months ago Securelist.com
The Role of Machine Learning in Cybersecurity - Machine learning plays a crucial role in cybersecurity by enhancing defense mechanisms and protecting sensitive information. The key advantage of using machine learning in cybersecurity is its ability to constantly adapt and learn from new threats. ...
1 year ago Securityzap.com
CVE-2024-26633 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
The Role of AI in Personalized Learning - Artificial Intelligence is playing an increasingly significant role in the field of education, particularly in personalized learning. In this article, we will explore the role of AI in personalized learning, with a focus on AI-driven adaptive ...
1 year ago Securityzap.com
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-26857 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
CVE-2024-35893 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-47685 - In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th->res1) Use ...
4 months ago Tenable.com
Online Learning Security Best Practices - The rapid increase in remote learning has raised security concerns surrounding online learning platforms. The security of online learning platforms involves implementing robust measures to protect against unauthorized access and data breaches. By ...
1 year ago Securityzap.com
The Role of IoT in Modern Education - From smart classrooms equipped with IoT devices to personalized learning platforms, IoT has paved the way for a more immersive and tailored educational experience. Overall, the integration of IoT in education holds great promise in transforming the ...
1 year ago Securityzap.com
How a Group of Train Hackers Exposed a Right-to-Repair Nightmare - Earlier this month, Polish hackers known as Dragon Sector accused one of Poland's largest train makers, Newag, of intentionally bricking its own trains when they're repaired by third parties. Newag threatened to sue Dragon Sector, but the story ...
1 year ago Packetstormsecurity.com
JFrog, AWS team up for machine learning in the cloud - Software supply chain provider JFrog is integrating with the Amazon SageMaker cloud-based machine learning platform to incorporate machine learning models into the software development lifecycle. The JFrog platform integration with Amazon SageMaker, ...
1 year ago Infoworld.com
CVE-2024-50083 - In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending ...
3 months ago Tenable.com
Week in review: Attackers use phishing emails to steal NTLM hashes, Patch Tuesday forecast - What organizations need to know about the Digital Operational Resilience ActIn this Help Net Security interview, Kris Lovejoy, Global Security and Resilience Leader at Kyndryl, discusses the impact of the Digital Operational Resilience Act on ...
11 months ago Helpnetsecurity.com
Week in review: PoC for Splunk Enterprise RCE flaw released, scope of Okta breach widens - Vulnerability disclosure: Legal risks and ethical considerations for researchersIn this Help Net Security interview, Eddie Zhang, Principal Consultant at Project Black, explores the complex and often controversial world of vulnerability disclosure in ...
1 year ago Helpnetsecurity.com
CVE-2024-26781 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in subflow diag Syzbot and Eric reported a lockdep splat in the subflow diag: WARNING: possible circular locking dependency detected ...
10 months ago Tenable.com
CVE-2023-52784 - In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. ...
9 months ago Tenable.com
How Healthcare Organizations can use ASPM to Fill CSPM Coverage Gaps and Save Money - In recent years, healthcare organizations have increasingly moved their healthcare information systems applications and infrastructure to the cloud to take advantage of its scalability, flexibility and cost-effectiveness. To mitigate these risks, ...
1 year ago Securityboulevard.com
CVE-2024-57802 - In the Linux kernel, the following vulnerability has been resolved: netrom: check buffer length before accessing it Syzkaller reports an uninit value read from ax25cmp when sending raw message through ieee802154 implementation. ...
1 month ago Tenable.com
Privacy-Preserving AI: Protocols to Practice - At the same time, it increases the possibility of personal information misuse, reaching unprecedented levels of power and speed in analyzing and spreading individuals' data. Machine learning employs algorithms to analyze data, improve performance, ...
1 year ago Feeds.dzone.com
CVE-2024-50035 - In the Linux kernel, the following vulnerability has been resolved: ppp: fix ppp_async_encode() illegal access syzbot reported an issue in ppp_async_encode() [1] In this case, pppoe_sendmsg() is called with a zero size. Then ppp_async_encode() is ...
4 months ago Tenable.com
CVE-2022-48956 - In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid use-after-free in ip6_fragment() Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers. It seems to not be always true, at least for UDP stack. syzbot ...
4 months ago Tenable.com
Cybersecurity Challenges in Remote Learning - The increasing prevalence of remote learning in the education sector has brought about new cybersecurity challenges that must be addressed. This article aims to delve into the various cyber threats faced in remote learning and provide practical ...
1 year ago Securityzap.com
Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG - It underscores the urgent need for robust security measures and proper monitoring in developing, fine-tuning, and deploying AI models. The emergence of advanced models, like Generative Pre-trained Transformer 4, marks a new era in the AI landscape. ...
1 year ago Feedpress.me

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)