Tag Archive: Cybersecurity

Senior Fellow Andrew Lohn discusses why AI and machine learning's vulnerabilities present limitations when applied in real-life defense applications in an interview with Forbes.

Securing AI

Andrew Lohn and Wyatt Hoffman
| March 2022

Like traditional software, vulnerabilities in machine learning software can lead to sabotage or information leakages. Also like traditional software, sharing information about vulnerabilities helps defenders protect their systems and helps attackers exploit them. This brief examines some of the key differences between vulnerabilities in traditional and machine learning systems and how those differences can affect the vulnerability disclosure and remediation processes.

Nvidia hack could help China according to CSET's policy.ai newsletter.

Margarita Konaev discusses concern over misinformation circulating on the internet on the war in Ukraine.

In an interview with CNBC, Margarita Konaev explained why Russian disinformation campaigns are failing to target audiences abroad and in Ukraine.

Georgetown’s Katerina Sedova talked about Russia’s use of cyberattacks as part of its attack on Ukraine on C-SPAN.

How China built a one-of-a-kind cyber-espionage behemoth to last

MIT Technology Review
| February 28, 2022

Dakota Cary's testimony before the U.S.-China Commission caught the attention of MIT Technology Review for his findings and recommendations on countering China's hacking capabilities.

Research Fellow Katerina Sedova discusses a variety of ways the Biden administration and its allies are supporting Ukraine against Russian cyberattacks.

In his testimony before the U.S.-China Economic and Security Review Commission, Research Analyst Dakota Cary outlines China's cyberespionage capabilities.

CSET Research Analyst Dakota Cary testified before the U.S.-China Economic and Security Review Commission hearing on "China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States." Cary discussed the cooperative relationship between Chinese universities and China’s military and intelligence services to develop talent with the capabilities to perform state-sponsored cyberespionage operations.