In a BBC article that discusses the urgent need to integrate cybersecurity measures into artificial intelligence systems, CSET's Andrew Lohn provided his expert analysis.
During her interview with ABC News Live, CSET's Helen Toner delved into the significant growth of Artificial Intelligence, with a particular emphasis on its impact within the realm of National Security.
Recent discussions of AI have focused on safety, reliability, and other risks. Lost in this debate is the real need to secure AI against malicious actors. This blog post applies lessons from traditional cybersecurity to emerging AI-model risks.
In a WIRED article, CSET's Emily S. Weinstein contributed her expertise to the discussion surrounding the existence of encryption chips produced by Hualan Microelectronics, a Chinese company that has been identified by the US Department of Commerce due to its affiliations with the Chinese military.
CSET's Heather Frase was interviewed by Politico, and the discussion was published in their newsletter in a segment that discusses a plan by the U.S. government to conduct a public experiment at the DEFCON 31 hacking convention in August.
The Eurasian Times cited a CSET report by Jack Corrigan, Sergio Fontanez, and Michael Kratsios in an article about the tightening of laws around cybersecurity and espionage by the US and China.
CSET’s Heather Frase was interviewed by The Financial Times in an article about OpenAI's red team and their mission to test and mitigate the risks of GPT-4.
CSET's Josh A. Goldstein was recently quoted in a WIRED article about state-backed hacking groups using fake LinkedIn profiles to steal information from their targets. Goldstein provides insight by highlighting the issues in the disinformation space.
An article published in OODA Loop cited a report by CSET's Josh Goldstein, Micah Musser, and CSET alumna Katerina Sedova in collaboration with OpenAI and Stanford Internet Observatory. The report explores the potential misuse of language models for influence operations in the future, and provides a framework for assessing mitigation strategies.
This website uses cookies.
To learn more, please review this policy. By continuing to browse the site, you agree to these terms.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.