Cybersecurity – NVIDIA Technical Blog News and tutorials for developers, data scientists, and IT admins 2025-03-03T17:22:13Z https://developer.nvidia.com/blog/feed/ Aditi Bodhankar <![CDATA[Measuring the Effectiveness and Performance of AI Guardrails in Generative AI Applications]]> https://developer.nvidia.com/blog/?p=96562 2025-03-03T17:22:13Z 2025-03-03T17:22:09Z Safeguarding AI agents and other conversational AI applications to ensure safe, on-brand and reliable behavior is essential for enterprises. NVIDIA NeMo...]]>

Safeguarding AI agents and other conversational AI applications to ensure safe, on-brand and reliable behavior is essential for enterprises. NVIDIA NeMo Guardrails offers robust protection with AI guardrails for content safety, topic control, jailbreak detection, and more to evaluate and optimize guardrail performance. In this post, we explore techniques for measuring and optimizing your AI…

Source

]]>
Leon Derczynski <![CDATA[Defining LLM Red Teaming]]> https://developer.nvidia.com/blog/?p=96239 2025-02-28T17:15:40Z 2025-02-25T18:49:26Z There is an activity where people provide inputs to generative AI technologies, such as large language models (LLMs), to see if the outputs can be made to...]]>

There is an activity where people provide inputs to generative AI technologies, such as large language models (LLMs), to see if the outputs can be made to deviate from acceptable standards. This use of LLMs began in 2023 and has rapidly evolved to become a common industry practice and a cornerstone of trustworthy AI. How can we standardize and define LLM red teaming?

Source

]]>
Rich Harang <![CDATA[Agentic Autonomy Levels and Security]]> https://developer.nvidia.com/blog/?p=96341 2025-02-26T19:20:12Z 2025-02-25T18:45:05Z Agentic workflows are the next evolution in AI-powered tools. They enable developers to chain multiple AI models together to perform complex activities, enable...]]>

Agentic workflows are the next evolution in AI-powered tools. They enable developers to chain multiple AI models together to perform complex activities, enable AI models to use tools to access additional data or automate user actions, and enable AI models to operate autonomously, analyzing and performing complex tasks with a minimum of human involvement or interaction. Because of their power…

Source

]]>
Tim Lustig <![CDATA[Featured Networking Sessions at NVIDIA GTC 2025]]> https://developer.nvidia.com/blog/?p=96189 2025-02-20T15:52:20Z 2025-02-17T05:34:30Z Explore the latest advancements in AI infrastructure, acceleration, and security from March 17-21.]]>

Explore the latest advancements in AI infrastructure, acceleration, and security from March 17-21.

Source

]]>
Aditi Bodhankar <![CDATA[How to Safeguard AI Agents for Customer Service with NVIDIA NeMo Guardrails]]> https://developer.nvidia.com/blog/?p=94928 2025-02-04T19:53:15Z 2025-01-16T14:00:00Z AI agents present a significant opportunity for businesses to scale and elevate customer service and support interactions. By automating routine inquiries and...]]>

AI agents present a significant opportunity for businesses to scale and elevate customer service and support interactions. By automating routine inquiries and enhancing response times, these agents improve efficiency and customer satisfaction, helping organizations stay competitive. However, alongside these benefits, AI agents come with risks. Large language models (LLMs) are vulnerable to…

Source

]]>
Charu Chaubal <![CDATA[New Whitepaper: NVIDIA AI Enterprise Security]]> https://developer.nvidia.com/blog/?p=94475 2024-12-20T20:56:54Z 2024-12-20T00:41:33Z This white paper details our commitment to securing the NVIDIA AI Enterprise software stack. It outlines the processes and measures NVIDIA takes to ensure...]]>

This white paper details our commitment to securing the NVIDIA AI Enterprise software stack. It outlines the processes and measures NVIDIA takes to ensure container security.

Source

]]>
Joseph Lucas <![CDATA[Sandboxing Agentic AI Workflows with WebAssembly]]> https://developer.nvidia.com/blog/?p=93975 2024-12-16T21:06:56Z 2024-12-16T20:33:46Z Agentic AI workflows often involve the execution of large language model (LLM)-generated code to perform tasks like creating data visualizations. However, this...]]>

Agentic AI workflows often involve the execution of large language model (LLM)-generated code to perform tasks like creating data visualizations. However, this code should be sanitized and executed in a safe environment to mitigate risks from prompt injection and errors in the returned code. Sanitizing Python with regular expressions and restricted runtimes is insufficient…

Source

]]>
Aditi Bodhankar <![CDATA[Content Moderation and Safety Checks with NVIDIA NeMo Guardrails]]> https://developer.nvidia.com/blog/?p=92908 2024-12-13T01:12:41Z 2024-12-06T17:23:51Z Content moderation has become essential in retrieval-augmented generation (RAG) applications powered by generative AI, given the extensive volume of...]]>

Source

]]>
1
Anton Aleksandrov <![CDATA[Automate Early Security Patching in CI Pipelines on AWS Using NVIDIA AI Blueprints]]> https://developer.nvidia.com/blog/?p=92919 2025-02-13T20:46:09Z 2024-12-03T18:30:00Z The evolution of modern application development has led to a significant shift toward microservice-based architectures. This approach offers great flexibility...]]>

The evolution of modern application development has led to a significant shift toward microservice-based architectures. This approach offers great flexibility and scalability, but it also introduces new complexities, particularly in the realm of security. In the past, engineering teams were responsible for a handful of security aspects in their monolithic applications. Now, with microservices…

Source

]]>
Yarkin Doroz <![CDATA[Introducing NVIDIA cuPQC for GPU-Accelerated Post-Quantum Cryptography]]> https://developer.nvidia.com/blog/?p=92737 2024-12-12T19:45:49Z 2024-12-03T18:00:00Z In the past decade, quantum computers have progressed significantly and could one day be used to undermine current cybersecurity practices. If run on a quantum...]]>

In the past decade, quantum computers have progressed significantly and could one day be used to undermine current cybersecurity practices. If run on a quantum computer, for example, an algorithm discovered by the theoretical computer scientist Peter Shor could crack common encryption schemes, including the Rivest-Shamir-Adleman (RSA) encryption algorithm. Post-quantum cryptography (PQC) is…

Source

]]>
Rob Nertney <![CDATA[Exploring the Case of Super Protocol with Self-Sovereign AI and NVIDIA Confidential Computing]]> https://developer.nvidia.com/blog/?p=91216 2025-02-04T19:53:37Z 2024-11-14T22:01:38Z Confidential and self-sovereign AI is a new approach to AI development, training, and inference where the user’s data is decentralized, private, and...]]>

Confidential and self-sovereign AI is a new approach to AI development, training, and inference where the user’s data is decentralized, private, and controlled by the users themselves. This post explores how the capabilities of Confidential Computing (CC) are expanded through decentralization using blockchain technology. The problem being solved is most clearly shown through the use of…

Source

]]>
24
Elad Blatt <![CDATA[Transforming Telecom Networks to Manage and Optimize AI Workloads]]> https://developer.nvidia.com/blog/?p=91542 2024-11-14T19:36:13Z 2024-11-08T16:00:00Z 5G global connections numbered nearly 2 billion earlier this year, and are projected to reach 7.7 billion by 2028. While 5G has delivered faster speeds, higher...]]>

5G global connections numbered nearly 2 billion earlier this year, and are projected to reach 7.7 billion by 2028. While 5G has delivered faster speeds, higher capacity, and improved latency, particularly for video and data traffic, the initial promise of creating new revenues for network operators has remained elusive. Most mobile applications are now routed to the cloud. At the same time…

Source

]]>
Summer Liu <![CDATA[Supercharging Fraud Detection in Financial Services with Graph Neural Networks]]> https://developer.nvidia.com/blog/?p=90877 2024-10-31T18:36:06Z 2024-10-28T15:30:00Z Fraud in financial services is a massive problem. According to NASDAQ, in 2023, banks faced $442 billion in projected losses from payments, checks, and credit...]]>

Fraud in financial services is a massive problem. According to NASDAQ, in 2023, banks faced $442 billion in projected losses from payments, checks, and credit card fraud. It’s not just about the money, though. Fraud can tarnish a company’s reputation and frustrate customers when legitimate purchases are blocked. This is called a false positive. Unfortunately, these errors happen more often than…

Source

]]>
Katherine Huang <![CDATA[Augmenting Security Operations Centers with Accelerated Alert Triage and LLM Agents Using NVIDIA Morpheus]]> https://developer.nvidia.com/blog/?p=89875 2024-10-31T18:37:51Z 2024-10-24T18:02:16Z Every day, security operation center (SOC) analysts receive an overwhelming amount of incoming security alerts. To ensure the continued safety of their...]]>

Every day, security operation center (SOC) analysts receive an overwhelming amount of incoming security alerts. To ensure the continued safety of their organization, they are tasked with wading through the incoming noise, triaging out false positives, and sniffing out what could be indicators of a true security breach. However, the sheer quantity of alerts may mean that important early indicators…

Source

]]>
Matan Raz <![CDATA[Future-Proof Your Networking Stack with NVIDIA DOCA-OFED]]> https://developer.nvidia.com/blog/?p=90299 2024-10-17T18:18:56Z 2024-10-15T20:28:17Z The NVIDIA DOCA software platform unlocks the potential of the NVIDIA BlueField networking platform and provides all needed host drivers for NVIDIA BlueField...]]>

The NVIDIA DOCA software platform unlocks the potential of the NVIDIA BlueField networking platform and provides all needed host drivers for NVIDIA BlueField and ConnectX devices. Optimized for peak performance, DOCA equips users to meet the demands of increasingly complex workloads. Its modular structure offers the flexibility needed to adapt to emerging technologies and higher data throughputs.

Source

]]>
Summer Liu <![CDATA[Rapidly Triage Container Security with the Vulnerability Analysis NVIDIA NIM Agent Blueprint]]> https://developer.nvidia.com/blog/?p=87127 2024-10-22T20:34:00Z 2024-10-08T15:00:00Z Addressing software security issues is becoming more challenging as the number of vulnerabilities reported in the CVE database continues to grow at an...]]>

Addressing software security issues is becoming more challenging as the number of vulnerabilities reported in the CVE database continues to grow at an accelerated pace. Assessing a single container for vulnerabilities requires the collection, comprehension, and synthesis of hundreds of pieces of information. With over 200K vulnerabilities reported at the end of 2023, the traditional approach to…

Source

]]>
Summer Liu <![CDATA[Harnessing Data with AI to Boost Zero Trust Cyber Defense]]> https://developer.nvidia.com/blog/?p=89214 2024-10-28T21:54:29Z 2024-09-26T16:35:55Z Modern cyber threats have grown increasingly sophisticated, posing significant risks to federal agencies and critical infrastructure. According to Deloitte,...]]>

Modern cyber threats have grown increasingly sophisticated, posing significant risks to federal agencies and critical infrastructure. According to Deloitte, cybersecurity is the top priority for governments and public sectors, highlighting the need to adapt to an increasingly digital world for efficiency and speed. Threat examples include insider threats, supply chain vulnerabilities…

Source

]]>
Jochen Papenbrock <![CDATA[Event: Developer Day for Financial Services]]> https://developer.nvidia.com/blog/?p=89179 2024-09-19T19:28:59Z 2024-09-18T18:06:44Z Join this virtual developer day to learn how AI and Machine Learning can revolutionize fraud detection and financial crime prevention.]]>

Join this virtual developer day to learn how AI and Machine Learning can revolutionize fraud detection and financial crime prevention.

Source

]]>
Becca Lynch <![CDATA[NVIDIA Presents AI Security Expertise at Leading Cybersecurity Conferences]]> https://developer.nvidia.com/blog/?p=89054 2024-09-19T19:29:43Z 2024-09-18T17:03:46Z Each August, tens of thousands of security professionals attend the cutting-edge security conferences Black Hat USA and DEF CON. This year, NVIDIA AI security...]]>

Each August, tens of thousands of security professionals attend the cutting-edge security conferences Black Hat USA and DEF CON. This year, NVIDIA AI security experts joined these events to share our work and learn from other members of the community. This post provides an overview of these contributions, including a keynote on the rapidly evolving AI landscape…

Source

]]>
Gregory Kimball <![CDATA[Scaling Up to One Billion Rows of Data in pandas using RAPIDS cuDF]]> https://developer.nvidia.com/blog/?p=88761 2024-09-25T17:26:00Z 2024-09-11T16:54:53Z The One Billion Row Challenge is a fun benchmark to showcase basic data processing operations. It was originally launched as a pure-Java competition, and has...]]>

The One Billion Row Challenge is a fun benchmark to showcase basic data processing operations. It was originally launched as a pure-Java competition, and has gathered a community of developers in other languages, including Python, Rust, Go, Swift, and more. The challenge has been useful for many software engineers with an interest in exploring the details of text file reading…

Source

]]>
Joseph Lucas <![CDATA[Defending AI Model Files from Unauthorized Access with Canaries]]> https://developer.nvidia.com/blog/?p=85254 2025-02-04T19:45:15Z 2024-07-11T19:06:21Z As AI models grow in capability and cost of creation, and hold more sensitive or proprietary data, securing them at rest is increasingly important....]]>

As AI models grow in capability and cost of creation, and hold more sensitive or proprietary data, securing them at rest is increasingly important. Organizations are designing policies and tools, often as part of data loss prevention and secure supply chain programs, to protect model weights. While security engineering discussions focus on prevention (How do we prevent X?), detection (Did X…

Source

]]>
1
Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Building Cyber Language Models to Unlock New Cybersecurity Capabilities]]> https://developer.nvidia.com/blog/?p=84556 2025-02-04T19:45:51Z 2024-07-09T16:00:00Z General-purpose large language models (LLMs) have proven their usefulness across various fields, offering substantial benefits in applications ranging from text...]]>

General-purpose large language models (LLMs) have proven their usefulness across various fields, offering substantial benefits in applications ranging from text generation to complex problem-solving. However, there are circumstances where developing a bespoke language model becomes not just beneficial but essential. This necessity arises particularly in specialized domains characterized by…

Source

]]>
Laura Martinez <![CDATA[Advancing Security for Large Language Models with NVIDIA GPUs and Edgeless Systems]]> https://developer.nvidia.com/blog/?p=84832 2025-02-04T19:51:41Z 2024-07-02T17:28:48Z Edgeless Systems introduced Continuum AI, the first generative AI framework that keeps prompts encrypted at all times with confidential computing by combining...]]>

Edgeless Systems introduced Continuum AI, the first generative AI framework that keeps prompts encrypted at all times with confidential computing by combining confidential VMs with NVIDIA H100 GPUs and secure sandboxing. The launch of this platform underscores a new era in AI deployment, where the benefits of powerful LLMs can be realized without compromising data privacy and security.

Source

]]>
Joseph Lucas <![CDATA[Secure LLM Tokenizers to Maintain Application Integrity]]> https://developer.nvidia.com/blog/?p=84504 2024-07-10T15:28:33Z 2024-06-27T18:00:00Z This post is part of the NVIDIA AI Red Team’s continuing vulnerability and technique research. Use the concepts presented to responsibly assess and increase...]]>

This post is part of the NVIDIA AI Red Team’s continuing vulnerability and technique research. Use the concepts presented to responsibly assess and increase the security of your AI development and deployment processes and applications. Large language models (LLMs) don’t operate over strings. Instead, prompts are passed through an often-transparent translator called a tokenizer that creates an…

Source

]]>
Laura Martinez <![CDATA[Confidential and Self-Sovereign AI: Best Practices for Enhancing Security and Autonomy]]> https://developer.nvidia.com/blog/?p=83880 2024-06-27T18:18:06Z 2024-06-10T20:46:06Z  Join the webinar on June 11th with NVIDIA and Super Protocol to learn about the benefits of Confidential Computing for Web3 AI.]]>

Join the webinar on June 11th with NVIDIA and Super Protocol to learn about the benefits of Confidential Computing for Web3 AI.

Source

]]>
Scott Ciccone <![CDATA[Spotlight: Cisco Enhances Workload Security and Operational Efficiency with NVIDIA BlueField-3 DPUs]]> https://developer.nvidia.com/blog/?p=83704 2024-07-16T17:23:43Z 2024-06-10T20:24:54Z As cyberattacks become more sophisticated, organizations must constantly adapt with cutting-edge solutions to protect their critical assets. One such solution...]]>

As cyberattacks become more sophisticated, organizations must constantly adapt with cutting-edge solutions to protect their critical assets. One such solution is Cisco Secure Workload, a comprehensive security solution designed to safeguard application workloads across diverse infrastructures, locations, and form factors. Cisco recently announced version 3.9 of the Cisco Secure Workload…

Source

]]>
Bartley Richardson https://www.linkedin.com/in/bartleyrichardson/%20 <![CDATA[Applying Generative AI for CVE Analysis at an Enterprise Scale]]> https://developer.nvidia.com/blog/?p=82796 2024-05-30T19:55:47Z 2024-05-23T16:00:00Z The software development and deployment process is complex. Modern enterprise applications have complex software dependencies, forming an interconnected web...]]>

The software development and deployment process is complex. Modern enterprise applications have complex software dependencies, forming an interconnected web that provides unprecedented functionality, but with the cost of exponentially increasing complexity. Patching software security issues is becoming progressively more challenging as the number of reported security flaws in the common…

Source

]]>
Manoj Kumar <![CDATA[Revolutionizing Graph Analytics: Next-Gen Architecture with NVIDIA cuGraph Acceleration]]> https://developer.nvidia.com/blog/?p=81524 2024-05-15T17:14:58Z 2024-05-09T18:30:04Z In our previous exploration of graph analytics, we uncovered the transformative power of GPU-CPU fusion using NVIDIA cuGraph. Building upon those insights, we...]]>

In our previous exploration of graph analytics, we uncovered the transformative power of GPU-CPU fusion using NVIDIA cuGraph. Building upon those insights, we now introduce a revolutionary new architecture that redefines the boundaries of graph processing. During our earlier foray into graph analytics, we faced various challenges with the architecture we utilized. While effective…

Source

]]>
Sandip Patil <![CDATA[Enhancing Anomaly Detection in Linux Audit Logs with AI]]> https://developer.nvidia.com/blog/?p=81742 2024-05-15T17:16:24Z 2024-05-07T16:00:00Z In cybersecurity, identifying threats swiftly and accurately is paramount to the success of the modern enterprise. Linux audit logs, which record system...]]>

In cybersecurity, identifying threats swiftly and accurately is paramount to the success of the modern enterprise. Linux audit logs, which record system activities, offer a goldmine of data for spotting unusual activities that could signify security breaches and insider threats. NVIDIA Morpheus, an AI-driven cybersecurity framework, is at the forefront of enhancing anomaly detection in these…

Source

]]>
Apoorva Jain <![CDATA[Intelligent Traffic Offload with Enhanced AI-powered 5G Security for Enterprises]]> https://developer.nvidia.com/blog/?p=81629 2024-05-15T17:16:47Z 2024-05-06T15:00:00Z Securing the private 5G and applications at the edge comes with many challenges. Sophisticated AI– and ML-based attack campaigns require security to respond...]]>

Securing the private 5G and applications at the edge comes with many challenges. Sophisticated AI– and ML-based attack campaigns require security to respond in real time. Palo Alto Networks’ security platform has been incorporating ML and AI technological breakthroughs over the years to ensure that real-time ML capabilities and AI-driven incident responses are autonomous.

Source

]]>
Rob Nertney <![CDATA[Announcing Confidential Computing General Access on NVIDIA H100 Tensor Core GPUs]]> https://developer.nvidia.com/blog/?p=81376 2024-06-06T14:47:37Z 2024-04-25T17:00:00Z NVIDIA launched the initial release of the Confidential Computing (CC) solution in private preview for early access in July 2023 through NVIDIA LaunchPad....]]>

NVIDIA launched the initial release of the Confidential Computing (CC) solution in private preview for early access in July 2023 through NVIDIA LaunchPad. Confidential Computing can be used in virtualized environments and provides the highest level of security with the best performance possible in the industry today. The NVIDIA H100 Tensor Core GPU was the first GPU to introduce support for CC.

Source

]]>
Richard Kerris <![CDATA[Make the Most of NVIDIA GTC 2024 with In-Person, Hands-On Learning]]> https://developer.nvidia.com/blog/?p=78645 2024-04-09T23:45:33Z 2024-03-07T18:08:30Z We are so excited to be back in person at GTC this year at the San Jose Convention Center. With thousands of developers, industry leaders, researchers, and...]]>

We are so excited to be back in person at GTC this year at the San Jose Convention Center. With thousands of developers, industry leaders, researchers, and partners in attendance, attending GTC in person gives you the unique opportunity to network with legends in technology and AI, and experience NVIDIA CEO Jensen Huang’s keynote live on-stage at the SAP Center. Past GTC alumni? Get 40%

Source

]]>
Michelle Horton <![CDATA[Event: Cybersecurity Developer Day at NVIDIA GTC 2024]]> https://developer.nvidia.com/blog/?p=77761 2024-03-07T19:29:32Z 2024-02-28T17:00:00Z Join us on March 20 for Cybersecurity Developer Day at GTC to gain insights on leveraging generative AI for cyber defense.]]>

Join us on March 20 for Cybersecurity Developer Day at GTC to gain insights on leveraging generative AI for cyber defense.

Source

]]>
0
Michelle Horton <![CDATA[Top Public Sector Developer Sessions at NVIDIA GTC 2024]]> https://developer.nvidia.com/blog/?p=78343 2024-03-07T19:18:54Z 2024-02-27T22:26:13Z Join experts from NVIDIA and the public sector industry to learn how cybersecurity, generative AI, digital twins, and more are impacting the way that government...]]>

Join experts from NVIDIA and the public sector industry to learn how cybersecurity, generative AI, digital twins, and more are impacting the way that government agencies operate.

Source

]]>
0
Tanya Lenz <![CDATA[Developer Days at NVIDIA GTC 2024]]> https://developer.nvidia.com/blog/?p=78172 2024-03-07T19:18:57Z 2024-02-26T20:30:00Z Connect with industry leaders, learn from technical experts, and collaborate with peers at NVIDIA GTC 2024 Developer Days.]]>

Connect with industry leaders, learn from technical experts, and collaborate with peers at NVIDIA GTC 2024 Developer Days.

Source

]]>
0
Tanya Lenz <![CDATA[Featured Cybersecurity Sessions at NVIDIA GTC 2024]]> https://developer.nvidia.com/blog/?p=77736 2024-02-22T19:58:56Z 2024-02-14T20:26:51Z Discover how generative AI is powering cybersecurity solutions with enhanced speed, accuracy, and scalability.]]>

Discover how generative AI is powering cybersecurity solutions with enhanced speed, accuracy, and scalability.

Source

]]>
0
David Wills <![CDATA[Release: NVIDIA DOCA 2.6]]> https://developer.nvidia.com/blog/?p=77661 2024-10-11T20:02:17Z 2024-02-13T20:30:00Z The NVIDIA DOCA 2.6 release includes support for NVIDIA Spectrum-X reference architecture with the NVIDIA BlueField-3 SuperNIC and enhances DOCA host-based...]]>

The NVIDIA DOCA 2.6 release includes support for NVIDIA Spectrum-X reference architecture with the NVIDIA BlueField-3 SuperNIC and enhances DOCA host-based networking (HBN).

Source

]]>
0
David Wills <![CDATA[Delivering Efficient, High-Performance AI Clouds with NVIDIA DOCA 2.5]]> https://developer.nvidia.com/blog/?p=76643 2024-10-11T20:02:18Z 2024-01-24T19:31:39Z As a comprehensive software framework for data center infrastructure developers, NVIDIA DOCA has been adopted by leading AI, cloud, enterprise, and ISV...]]>

As a comprehensive software framework for data center infrastructure developers, NVIDIA DOCA has been adopted by leading AI, cloud, enterprise, and ISV innovators. The release of DOCA 2.5 marks its third anniversary. And, due to the stability and robustness of the code base combined with several networking and platform upgrades, DOCA 2.5 is the first NVIDIA BlueField-3 long-term support (LTS)…

Source

]]>
0
Nicola Sessions <![CDATA[Webinar: Improve Spear Phishing Detection with AI]]> https://developer.nvidia.com/blog/?p=77126 2024-02-08T18:51:58Z 2024-01-24T18:00:00Z Learn how generative AI can help defend against spear phishing in this January 30 webinar.]]>

Learn how generative AI can help defend against spear phishing in this January 30 webinar.

Source

]]>
0
Rishi Puri <![CDATA[Release: PyTorch Geometric Container for GNNs on NGC]]> https://developer.nvidia.com/blog/?p=76597 2024-06-06T16:17:50Z 2024-01-17T23:05:40Z The NVIDIA PyG container, now generally available, packages PyTorch Geometric with accelerations for GNN models, dataloading, and pre-processing using...]]>

The NVIDIA PyG container, now generally available, packages PyTorch Geometric with accelerations for GNN models, dataloading, and pre-processing using cuGraph-Ops, cuGraph, and cuDF from NVIDIA RAPIDS, all with an effortless out-of-the-box experience.

Source

]]>
0
Nicola Sessions <![CDATA[Bolstering Cybersecurity: How Large Language Models and Generative AI are Transforming Digital Security]]> https://developer.nvidia.com/blog/?p=73728 2023-12-14T19:27:39Z 2023-11-27T09:00:00Z Identity-based attacks are on the rise, with phishing remaining the most common and second-most expensive attack vector. Some attackers are using AI to craft...]]>

Identity-based attacks are on the rise, with phishing remaining the most common and second-most expensive attack vector. Some attackers are using AI to craft more convincing phishing messages and deploying bots to get around automated defenses designed to spot suspicious behavior. At the same time, a continued increase in enterprise applications introduces challenges for IT teams who must…

Source

]]>
0
Rich Harang <![CDATA[Best Practices for Securing LLM-Enabled Applications]]> https://developer.nvidia.com/blog/?p=73609 2024-07-08T20:07:28Z 2023-11-15T18:00:00Z Large language models (LLMs) provide a wide range of powerful enhancements to nearly any application that processes text. And yet they also introduce new risks,...]]>

Large language models (LLMs) provide a wide range of powerful enhancements to nearly any application that processes text. And yet they also introduce new risks, including: This post walks through these security vulnerabilities in detail and outlines best practices for designing or evaluating a secure LLM-enabled application. Prompt injection is the most common and well-known…

Source

]]>
0
Will Pearce <![CDATA[NVIDIA AI Red Team: Machine Learning Security Training]]> https://developer.nvidia.com/blog/?p=71491 2024-07-08T20:05:26Z 2023-10-19T20:26:15Z At Black Hat USA 2023, NVIDIA hosted a two-day training session that provided security professionals with a realistic environment and methodology to explore the...]]>

At Black Hat USA 2023, NVIDIA hosted a two-day training session that provided security professionals with a realistic environment and methodology to explore the unique risks presented by machine learning (ML) in today’s environments. In this post, the NVIDIA AI Red Team shares what was covered during the training and other opportunities to continue learning about ML security.

Source

]]>
5
Manoj Kumar <![CDATA[Supercharge Graph Analytics at Scale with GPU-CPU Fusion for 100x Performance]]> https://developer.nvidia.com/blog/?p=71544 2023-11-02T18:14:40Z 2023-10-13T21:18:33Z Graphs form the foundation of many modern data and analytics capabilities to find relationships between people, places, things, events, and locations across...]]>

Graphs form the foundation of many modern data and analytics capabilities to find relationships between people, places, things, events, and locations across diverse data assets. According to one study, by 2025 graph technologies will be used in 80% of data and analytics innovations, which will help facilitate rapid decision making across organizations. When working with graphs containing…

Source

]]>
0
Joseph Lucas <![CDATA[Analyzing the Security of Machine Learning Research Code]]> https://developer.nvidia.com/blog/?p=71113 2024-07-08T21:33:52Z 2023-10-04T18:00:00Z The NVIDIA AI Red Team is focused on scaling secure development practices across the data, science, and AI ecosystems. We participate in open-source security...]]>

The NVIDIA AI Red Team is focused on scaling secure development practices across the data, science, and AI ecosystems. We participate in open-source security initiatives, release tools, present at industry conferences, host educational competitions, and provide innovative training. Covering 3 years and totaling almost 140GB of source code, the recently released Meta Kaggle for Code dataset is…

Source

]]>
2
Tamás Fehér <![CDATA[Accelerated Vector Search: Approximating with NVIDIA cuVS Inverted Index]]> https://developer.nvidia.com/blog/?p=70772 2024-11-07T05:00:52Z 2023-10-02T18:16:58Z Performing an exhaustive exact k-nearest neighbor (kNN) search, also known as brute-force search, is expensive, and it doesn’t scale particularly well to...]]>

Performing an exhaustive exact k-nearest neighbor (kNN) search, also known as brute-force search, is expensive, and it doesn’t scale particularly well to larger datasets. During vector search, brute-force search requires the distance to be calculated between every query vector and database vector. For the frequently used Euclidean and cosine distances, the computation task becomes equivalent to a…

Source

]]>
0
Eric Boernert <![CDATA[Preventing Health Data Leaks with Federated Learning Using NVIDIA FLARE]]> https://developer.nvidia.com/blog/?p=71033 2024-05-10T00:21:34Z 2023-09-28T20:37:48Z More than 40 million people had their health data leaked in 2021, and the trend is not optimistic. The key goal of federated learning and analytics is to...]]>

More than 40 million people had their health data leaked in 2021, and the trend is not optimistic. The key goal of federated learning and analytics is to perform data analytics and machine learning without accessing the raw data of the remote sites. That’s the data you don’t own and are not supposed to access directly. But how can you make this happen with a higher degree of confidence?

Source

]]>
0
Shawn Davis <![CDATA[Generative AI and Accelerated Computing for Spear Phishing Detection]]> https://developer.nvidia.com/blog/?p=70728 2023-10-05T18:18:13Z 2023-09-12T18:00:00Z Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported...]]>

Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported losses in the United States alone. Business e-mail compromises led to $2.4 billion in costs in 2021, according to the FBI Internet Crime Report. In the period from June 2016 to December 2021, costs related to phishing and spear phishing totaled…

Source

]]>
0
Mickael Ide <![CDATA[Accelerating Vector Search: Fine-Tuning GPU Index Algorithms]]> https://developer.nvidia.com/blog/?p=69885 2024-11-18T21:16:14Z 2023-09-11T16:00:00Z In this post, we dive deeper into each of the GPU-accelerated indexes mentioned in part 1 and give a brief explanation of how the algorithms work, along with a...]]>

In this post, we dive deeper into each of the GPU-accelerated indexes mentioned in part 1 and give a brief explanation of how the algorithms work, along with a summary of important parameters to fine-tune their behavior. We then go through a simple end-to-end example to demonstrate cuVS’ Python APIs on a question-and-answer problem with a pretrained large language model and provide a…

Source

]]>
0
Mickael Ide <![CDATA[Accelerating Vector Search: Using GPU-Powered Indexes with NVIDIA cuVS]]> https://developer.nvidia.com/blog/?p=69884 2024-11-07T05:04:43Z 2023-09-11T15:59:00Z In the current AI landscape, vector search is one of the hottest topics due to its applications in large language models (LLM) and generative AI. Semantic...]]>

In the current AI landscape, vector search is one of the hottest topics due to its applications in large language models (LLM) and generative AI. Semantic vector search enables a broad range of important tasks like detecting fraudulent transactions, recommending products to users, using contextual information to augment full-text searches, and finding actors that pose potential security risks.

Source

]]>
0
Nir Rosen <![CDATA[Supercharge Ransomware Detection with AI-Enhanced Cybersecurity Solutions]]> https://developer.nvidia.com/blog/?p=68160 2023-09-07T18:33:23Z 2023-09-06T19:08:55Z Ransomware attacks have become increasingly popular, more sophisticated, and harder to detect. For example, in 2022, a destructive ransomware attack took 233...]]>

Ransomware attacks have become increasingly popular, more sophisticated, and harder to detect. For example, in 2022, a destructive ransomware attack took 233 days to identify and 91 days to contain, for a total lifecycle of 324 days. Going undetected for this amount of time can cause irreversible damage. Faster and smarter detection capabilities are critical to addressing these attacks.

Source

]]>
0
Vinu Joseph <![CDATA[Accelerated Encrypted Execution of General Purpose Applications]]> https://developer.nvidia.com/blog/?p=69406 2023-08-24T18:03:35Z 2023-08-22T19:55:49Z The advent of cloud computing has ushered in a paradigm shift in our data storage and utilization practices. Businesses can bypass the complexities of managing...]]>

The advent of cloud computing has ushered in a paradigm shift in our data storage and utilization practices. Businesses can bypass the complexities of managing their own computing infrastructure by tapping into remote, on-demand resources deftly managed by cloud service providers. Yet, there exists a palpable apprehension about sharing sensitive information with the cloud.

Source

]]>
0
Joseph Lucas <![CDATA[Mitigating Stored Prompt Injection Attacks Against LLM Applications]]> https://developer.nvidia.com/blog/?p=68917 2024-11-20T23:04:08Z 2023-08-04T16:05:50Z Prompt injection attacks are a hot topic in the new world of large language model (LLM) application security. These attacks are unique due to how ‌malicious...]]>

Prompt injection attacks are a hot topic in the new world of large language model (LLM) application security. These attacks are unique due to how ‌malicious text is stored in the system. An LLM is provided with prompt text, and it responds based on all the data it has been trained on and has access to. To supplement the prompt with useful context, some AI applications capture the input from…

Source

]]>
0
Emily Apsey <![CDATA[Confidential Computing on NVIDIA H100 GPUs for Secure and Trustworthy AI]]> https://developer.nvidia.com/blog/?p=68661 2023-08-24T18:03:52Z 2023-08-03T22:32:37Z Hardware virtualization is an effective way to isolate workloads in virtual machines (VMs) from the physical hardware and from each other. This offers improved...]]>

Hardware virtualization is an effective way to isolate workloads in virtual machines (VMs) from the physical hardware and from each other. This offers improved security, particularly in a multi-tenant environment. Yet, security risks such as in-band attacks, side-channel attacks, and physical attacks can still happen, compromising the confidentiality, integrity, or availability of your data and…

Source

]]>
1
Rich Harang <![CDATA[Securing LLM Systems Against Prompt Injection]]> https://developer.nvidia.com/blog/?p=68819 2024-07-08T20:08:30Z 2023-08-03T18:43:12Z Prompt injection is a new attack technique specific to large language models (LLMs) that enables attackers to manipulate the output of the LLM. This attack is...]]>

Prompt injection is a new attack technique specific to large language models (LLMs) that enables attackers to manipulate the output of the LLM. This attack is made more dangerous by the way that LLMs are increasingly being equipped with “plug-ins” for better responding to user requests by accessing up-to-date information, performing complex calculations, and calling on external services through…

Source

]]>
0
Elena Agostini <![CDATA[Realizing the Power of Real-Time Network Processing with NVIDIA DOCA GPUNetIO]]> https://developer.nvidia.com/blog/?p=68354 2023-10-23T17:15:37Z 2023-07-24T20:00:00Z Real-time processing of network traffic can be leveraged by the high degree of parallelism GPUs offer. Optimizing packet acquisition or transmission in these...]]>

Real-time processing of network traffic can be leveraged by the high degree of parallelism GPUs offer. Optimizing packet acquisition or transmission in these types of applications avoids bottlenecks and enables the overall execution to keep up with high-speed networks. In this context, DOCA GPUNetIO promotes the GPU as an independent component that can exercise network and compute tasks without…

Source

]]>
2
Michelle Horton <![CDATA[Webinar: AI-Enabled Cybersecurity for Financial Services]]> https://developer.nvidia.com/blog/?p=66894 2023-06-29T19:00:36Z 2023-06-20T19:54:02Z Learn how financial firms can build automated, real-time fraud and threat detection solutions with NVIDIA Morpheus.]]>

Learn how financial firms can build automated, real-time fraud and threat detection solutions with NVIDIA Morpheus.

Source

]]>
0
Will Pearce <![CDATA[NVIDIA AI Red Team: An Introduction]]> https://developer.nvidia.com/blog/?p=66214 2024-07-08T20:06:41Z 2023-06-14T22:00:16Z Machine learning has the promise to improve our world, and in many ways it already has. However, research and lived experiences continue to show this technology...]]>

Machine learning has the promise to improve our world, and in many ways it already has. However, research and lived experiences continue to show this technology has risks. Capabilities that used to be restricted to science fiction and academia are increasingly available to the public. The responsible use and development of AI requires categorizing, assessing, and mitigating enumerated risks where…

Source

]]>
0
Michelle Horton <![CDATA[Webinar: Accelerate AI Model Inference at Scale for Financial Services]]> https://developer.nvidia.com/blog/?p=66045 2023-12-05T18:57:33Z 2023-06-01T17:04:32Z Learn how AI is transforming financial services across use cases such as fraud detection, risk prediction models, contact centers, and more. ]]>

Learn how AI is transforming financial services across use cases such as fraud detection, risk prediction models, contact centers, and more.

Source

]]>
0
Uttara Kumar <![CDATA[Protecting Sensitive Data and AI Models with Confidential Computing]]> https://developer.nvidia.com/blog/?p=65575 2023-12-05T18:57:47Z 2023-05-31T18:47:55Z Rapid digital transformation has led to an explosion of sensitive data being generated across the enterprise. That data has to be stored and processed in data...]]>

Rapid digital transformation has led to an explosion of sensitive data being generated across the enterprise. That data has to be stored and processed in data centers on-premises, in the cloud, or at the edge. Examples of activities that generate sensitive and personally identifiable information (PII) include credit card transactions, medical imaging or other diagnostic tests, insurance claims…

Source

]]>
0
Rajesh Gadiyar <![CDATA[A New Frontier for 5G Network Security]]> https://developer.nvidia.com/blog/?p=64752 2024-03-13T17:47:18Z 2023-05-31T18:45:11Z Wireless technology has evolved rapidly and the 5G deployments have made good progress around the world. Up until recently, wireless RAN was deployed using...]]>

Wireless technology has evolved rapidly and the 5G deployments have made good progress around the world. Up until recently, wireless RAN was deployed using closed-box appliance solutions by traditional RAN vendors. This closed-box approach is not scalable, underuses the infrastructure, and does not deliver optimal RAN TCO. It has many shortcomings. We have come to realize that such closed-box…

Source

]]>
0
Michelle Horton <![CDATA[Webinar: Cybersecurity and AI in Retail]]> https://developer.nvidia.com/blog/?p=63879 2023-08-18T20:51:36Z 2023-05-08T16:00:00Z ​Join NVIDIA on Tuesday, June 6 for a webinar on cybersecurity and AI in retail. We discuss how AI can bring a new level of information security to the data...]]>

​Join NVIDIA on Tuesday, June 6 for a webinar on cybersecurity and AI in retail. We discuss how AI can bring a new level of information security to the data center, cloud, and edge.

Source

]]>
0
Moran Gonen <![CDATA[Accelerating the Suricata IDS/IPS with NVIDIA BlueField DPUs]]> https://developer.nvidia.com/blog/?p=63811 2023-05-18T18:22:57Z 2023-05-04T18:45:02Z Deep packet inspection (DPI) is a critical technology for network security that enables the inspection and analysis of data packets as they travel across a...]]>

Deep packet inspection (DPI) is a critical technology for network security that enables the inspection and analysis of data packets as they travel across a network. By examining the content of these packets, DPI can identify potential security threats such as malware, viruses, and malicious traffic, and prevent them from infiltrating the network. However, the implementation of DPI also comes with…

Source

]]>
10
Michelle Horton <![CDATA[Now Available: NVIDIA NeMo Guardrails]]> https://developer.nvidia.com/blog/?p=63697 2024-11-20T19:59:21Z 2023-04-28T16:00:00Z Develop safe and trustworthy LLM conversational applications with NVIDIA NeMo Guardrails, an open-source toolkit that enables programmable guardrails for...]]>

Develop safe and trustworthy LLM conversational applications with NVIDIA NeMo Guardrails, an open-source toolkit that enables programmable guardrails for defining desired user interactions within an application.

Source

]]>
0
Nicola Sessions <![CDATA[ICYMI: New and Updated AI Workflows Announced at NVIDIA GTC 2023]]> https://developer.nvidia.com/blog/?p=62115 2023-03-30T17:43:51Z 2023-03-22T15:00:00Z NVIDIA showed how AI workflows can be leveraged to help you accelerate the development of AI solutions to address a range of use cases at NVIDIA GTC 2023. AI...]]>

NVIDIA showed how AI workflows can be leveraged to help you accelerate the development of AI solutions to address a range of use cases at NVIDIA GTC 2023. AI workflows are cloud-native, packaged reference examples showing how NVIDIA AI frameworks can be used to efficiently build AI solutions such as intelligent virtual assistants, digital fingerprinting for cybersecurity…

Source

]]>
0
Itay Ozery <![CDATA[Transform the Data Center for the AI Era with NVIDIA DPUs and NVIDIA DOCA]]> https://developer.nvidia.com/blog/?p=62095 2023-10-23T17:20:53Z 2023-03-21T17:00:00Z NVIDIA BlueField-3 data processing units (DPUs) are now in full production, and have been selected by Oracle Cloud Infrastructure (OCI) to achieve higher...]]>

NVIDIA BlueField-3 data processing units (DPUs) are now in full production, and have been selected by Oracle Cloud Infrastructure (OCI) to achieve higher performance, better efficiency, and stronger security, as announced at NVIDIA GTC 2023. As a 400 Gb/s infrastructure compute platform, BlueField-3 enables organizations to deploy and operate data centers at massive scale.

Source

]]>
0
Nicola Sessions <![CDATA[NVIDIA Morpheus Helps Defend Against Spear Phishing with Generative AI]]> https://developer.nvidia.com/blog/?p=62189 2023-03-23T17:12:11Z 2023-03-21T16:50:53Z Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and...]]>

Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and with extremely short training times. In fact, using NVIDIA Morpheus and a generative AI training technique, we were able to detect 90% of targeted spear phishing emails—a 20% improvement compared to a typical phishing detection solution…

Source

]]>
2
Rachel Allen https://www.linkedin.com/in/rachel-kay-allen-913b5696/%20 <![CDATA[From Neuroscience to Data Science: My Road Into Cybersecurity]]> https://developer.nvidia.com/blog/?p=61604 2023-03-14T18:21:43Z 2023-03-14T16:00:00Z If you asked a group of cybersecurity professionals how they got into the field, you might be surprised by the answers that you receive. With military officers,...]]>

If you asked a group of cybersecurity professionals how they got into the field, you might be surprised by the answers that you receive. With military officers, program managers, technical writers, and IT practitioners, their backgrounds are varied. There is no single path into a cybersecurity career, let alone one that incorporates both cybersecurity and AI. I’ve always been…

Source

]]>
0
Dylan Makowski <![CDATA[Detecting Malware with Purple Team Collaboration]]> https://developer.nvidia.com/blog/?p=61661 2023-03-10T20:34:53Z 2023-03-10T21:00:00Z When it comes to new malware written in esoteric programming languages, Blue Team defenders have very little chance to ensure that all endpoints in their...]]>

When it comes to new malware written in esoteric programming languages, Blue Team defenders have very little chance to ensure that all endpoints in their organization are able to detect and/or mitigate this malware. Security professionals have quickly recognized this issue and have built an effective pipeline to identify new releases of unique malware and develop detections for them.

Source

]]>
0
Rick Merritt <![CDATA[Explainer: What Is Confidential Computing?]]> https://developer.nvidia.com/blog/?p=61586 2024-06-05T22:13:41Z 2023-03-08T20:00:00Z Confidential computing is a way of processing data in a protected zone of a computer’s processor, often inside a remote edge or public cloud server, and...]]>

Confidential computing is a way of processing data in a protected zone of a computer’s processor, often inside a remote edge or public cloud server, and proving that no one viewed or altered the work.

Source

]]>
0
Nicola Sessions <![CDATA[Top Cybersecurity Sessions at NVIDIA GTC 2023]]> https://developer.nvidia.com/blog/?p=61461 2023-03-09T19:15:54Z 2023-03-01T22:00:00Z Learn how AI is improving your cybersecurity to detect threats faster.]]>

Learn how AI is improving your cybersecurity to detect threats faster.

Source

]]>
0
Joseph Lucas <![CDATA[Evaluating the Security of Jupyter Environments]]> https://developer.nvidia.com/blog/?p=60938 2024-07-09T15:25:19Z 2023-02-13T20:30:00Z How can you tell if your Jupyter instance is secure? The NVIDIA AI Red Team has developed a JupyterLab extension to automatically assess the security of Jupyter...]]>

How can you tell if your Jupyter instance is secure? The NVIDIA AI Red Team has developed a JupyterLab extension to automatically assess the security of Jupyter environments. jupysec is a tool that evaluates the user’s environment against almost 100 rules that detect configurations and artifacts that have been identified by the AI Red Team as potential vulnerabilities, attack vectors…

Source

]]>
0
Tim Lustig <![CDATA[Top Networking Sessions at NVIDIA GTC 2023]]> https://developer.nvidia.com/blog/?p=60877 2023-02-23T18:45:58Z 2023-02-09T19:17:33Z Check out this NVIDIA GTC 2023 playlist to see all the sessions on accelerated networking, sustainable data centers, Ethernet for HPC, and more.]]>

Check out this NVIDIA GTC 2023 playlist to see all the sessions on accelerated networking, sustainable data centers, Ethernet for HPC, and more.

Source

]]>
0
Nicola Sessions <![CDATA[Hands-on Lab: Digital Fingerprinting to Detect Cyber Threats]]> https://developer.nvidia.com/blog/?p=60721 2023-02-23T18:34:17Z 2023-02-08T16:00:00Z Learn how to use an NVIDIA AI workflow to uniquely fingerprint users and machines across your network in a new, free NVIDIA LaunchPad hands-on lab.]]>

Learn how to use an NVIDIA AI workflow to uniquely fingerprint users and machines across your network in a new, free NVIDIA LaunchPad hands-on lab.

Source

]]>
0
Dylan Makowski <![CDATA[Exploiting and Securing Jenkins Instances at Scale with GroovyWaiter]]> https://developer.nvidia.com/blog/?p=60007 2023-02-13T18:16:38Z 2023-01-24T18:30:00Z Jenkins CI/CD solution provides a way for developers to create an automated, scalable, and highly configurable pipeline to ensure that code bases stay...]]>

Jenkins CI/CD solution provides a way for developers to create an automated, scalable, and highly configurable pipeline to ensure that code bases stay up-to-date and can be pushed out with very little effort. When a developer pushes new commits to any code, Jenkins can pick up on those changes and run a series of tests and builds, then ship it to production in one seamless pipeline.

Source

]]>
0
Eric Pulvino <![CDATA[Using a Network Digital Twin as an IT Training Tool]]> https://developer.nvidia.com/blog/?p=59753 2023-01-26T20:18:33Z 2023-01-13T17:59:11Z As organizations rely on complex network systems to support their operations, the need for well-trained network administrators is becoming increasingly...]]>

As organizations rely on complex network systems to support their operations, the need for well-trained network administrators is becoming increasingly important. Data center infrastructure is interconnected in ways that are not always obvious, and the points of intersection between systems are often difficult to design on paper alone. In order to ensure that network administrators are well…

Source

]]>
0
Matan Raz <![CDATA[Developers Design Innovative Network Security Solutions at the NVIDIA Cybersecurity Hackathon]]> https://developer.nvidia.com/blog/?p=58662 2023-02-13T17:10:06Z 2022-12-14T17:00:00Z The latest NVIDIA Cybersecurity Hackathon brought together 10 teams to create exciting cybersecurity innovations using the NVIDIA Morpheus cybersecurity AI...]]>

The latest NVIDIA Cybersecurity Hackathon brought together 10 teams to create exciting cybersecurity innovations using the NVIDIA Morpheus cybersecurity AI framework, NVIDIA BlueField data processing unit (DPU), and NVIDIA DOCA. The event featured seven onsite Israeli teams and three remote teams from India and the UK. Working around the clock for 24 hours, the teams were challenged with…

Source

]]>
1
Joseph Lucas <![CDATA[Improving Machine Learning Security Skills at a DEF CON Competition]]> https://developer.nvidia.com/blog/?p=57692 2024-07-09T16:36:32Z 2022-11-30T21:00:00Z Machine learning (ML) security is a new discipline focused on the security of machine learning systems and the data they are built upon. It exists at the...]]>

Machine learning (ML) security is a new discipline focused on the security of machine learning systems and the data they are built upon. It exists at the intersection of the information security and data science domains. While the state-of-the-art moves forward, there is no clear onboarding and learning path for securing and testing machine learning systems. How, then…

Source

]]>
0
Tanya Lenz <![CDATA[New Workshop: Data Parallelism: How to Train Deep Learning Models on Multiple GPUs]]> https://developer.nvidia.com/blog/?p=57722 2023-06-12T08:32:16Z 2022-11-29T18:30:00Z Learn how to decrease model training time by distributing data to multiple GPUs, while retaining the accuracy of training on a single GPU.]]>

Learn how to decrease model training time by distributing data to multiple GPUs, while retaining the accuracy of training on a single GPU.

Source

]]>
0
Nicola Sessions <![CDATA[Upcoming Event: Improve Your Cybersecurity Posture with AI]]> https://developer.nvidia.com/blog/?p=56537 2023-08-18T20:37:57Z 2022-10-26T21:30:00Z Find out how federal agencies are adopting AI to improve cybersecurity in this November 16 webinar featuring Booz Allen Hamilton.]]>

Find out how federal agencies are adopting AI to improve cybersecurity in this November 16 webinar featuring Booz Allen Hamilton.

Source

]]>
0
Bartley Richardson https://www.linkedin.com/in/bartleyrichardson/%20 <![CDATA[Changing Cybersecurity with Natural Language Processing]]> https://developer.nvidia.com/blog/?p=55796 2023-03-14T19:01:41Z 2022-10-19T17:51:00Z If you’ve used a chatbot, predictive text to finish a thought in an email, or pressed “0” to speak to an operator, you’ve come across natural language...]]>

If you’ve used a chatbot, predictive text to finish a thought in an email, or pressed “0” to speak to an operator, you’ve come across natural language processing (NLP). As more enterprises adopt NLP, the sub-field is developing beyond those popular use cases of machine-human communication to machines interpreting both human and non-human language. This creates an exciting opportunity for…

Source

]]>
0
Shawn Richardson <![CDATA[Five Tips for Building a Cybersecurity Career in the Age of AI]]> https://developer.nvidia.com/blog/?p=56103 2023-06-12T08:45:54Z 2022-10-14T16:00:00Z Career-related questions are common during NVIDIA cybersecurity webinars and GTC sessions. How do you break into the profession? What experience do you need?...]]>

Career-related questions are common during NVIDIA cybersecurity webinars and GTC sessions. How do you break into the profession? What experience do you need? And how do AI skills intersect with cybersecurity skills? The truth is, that while the barrier to entry may seem high, there is no single path into a career that focuses on or incorporates cybersecurity and AI. With many disciplines in…

Source

]]>
0
Nicola Sessions <![CDATA[Safeguarding Networks and Assets with Digital Fingerprinting]]> https://developer.nvidia.com/blog/?p=55803 2023-06-12T08:52:56Z 2022-10-05T16:00:00Z Use of stolen or compromised credentials remains at the top of the list as the most common cause of a data breach. Because an attacker is using credentials or...]]>

Use of stolen or compromised credentials remains at the top of the list as the most common cause of a data breach. Because an attacker is using credentials or passwords to compromise an organization’s network, they can bypass traditional security measures designed to keep adversaries out. When they’re inside the network, attackers can move laterally and gain access to sensitive data…

Source

]]>
0
Ashish Sardana <![CDATA[Optimizing Fraud Detection in Financial Services with Graph Neural Networks and NVIDIA GPUs]]> https://developer.nvidia.com/blog/?p=55557 2023-12-05T18:55:13Z 2022-10-04T13:00:00Z Fraud is a major problem for many financial services firms, costing billions of dollars each year, according to a recent Federal Trade Commission report....]]>

Fraud is a major problem for many financial services firms, costing billions of dollars each year, according to a recent Federal Trade Commission report. Financial fraud, fake reviews, bot assaults, account takeovers, and spam are all examples of online fraud and harmful activity. Although these firms employ techniques to combat online fraud, the methods can have severe limitations.

Source

]]>
7
Rick Merritt <![CDATA[Explainer: What is Zero Trust?]]> https://developer.nvidia.com/blog/?p=52707 2024-06-05T21:43:54Z 2022-09-28T19:00:00Z Zero trust is a cybersecurity strategy for verifying every user, device, application, and transaction in the belief that no user or process should be trusted.]]>

Zero trust is a cybersecurity strategy for verifying every user, device, application, and transaction in the belief that no user or process should be trusted.

Source

]]>
0
Nicola Sessions <![CDATA[Detecting Threats Faster with AI-Based Cybersecurity]]> https://developer.nvidia.com/blog/?p=55006 2023-07-11T23:10:17Z 2022-09-22T18:40:00Z Network traffic continues to increase, with the number of Internet users across the globe reaching 5 billion in 2022. As the number of users expands, so does...]]>

Network traffic continues to increase, with the number of Internet users across the globe reaching 5 billion in 2022. As the number of users expands, so does the number of connected devices, which is expected to grow into the trillions. The ever-increasing number of connected users and devices leads to an overwhelming amount of data generated across the network. According to IDC…

Source

]]>
0
Erik Pounds <![CDATA[New Languages, Enhanced Cybersecurity, and Medical AI Frameworks Unveiled at GTC]]> https://developer.nvidia.com/blog/?p=54868 2023-05-23T23:52:54Z 2022-09-21T15:18:00Z At GTC 2022, NVIDIA introduced enhancements to AI frameworks for building real-time speech AI applications, designing high-performing recommenders at scale,...]]>

At GTC 2022, NVIDIA introduced enhancements to AI frameworks for building real-time speech AI applications, designing high-performing recommenders at scale, applying AI to cybersecurity challenges, creating AI-powered medical devices, and more. Showcased real-world, end-to-end AI frameworks highlighted the customers and partners leading the way in their industries and domains.

Source

]]>
0
Michael Boone <![CDATA[Enhancing AI Transparency and Ethical Considerations with Model Card++]]> https://developer.nvidia.com/blog/?p=54689 2024-02-23T16:47:31Z 2022-09-19T18:59:00Z An AI model card is a document that details how machine learning (ML) models work. Model cards provide detailed information about the ML model’s metadata...]]>

An AI model card is a document that details how machine learning (ML) models work. Model cards provide detailed information about the ML model’s metadata including the datasets that it is based on, performance measures that it was trained on, and the deep learning training methodology itself. This post walks you through the current practice for AI model cards and how NVIDIA is planning to advance…

Source

]]>
0
Kevin Levitt <![CDATA[Top Financial Services Sessions at NVIDIA GTC 2022]]> https://developer.nvidia.com/blog/?p=54447 2022-10-20T22:50:49Z 2022-09-09T16:00:00Z Discover how Deutsche Bank, U.S. Bank, Capital One, and other firms are using AI technologies to optimize customer experience in financial services through...]]>

Discover how Deutsche Bank, U.S. Bank, Capital One, and other firms are using AI technologies to optimize customer experience in financial services through recommender systems, NLP, and more.

Source

]]>
0
Rick Merritt <![CDATA[Explainer: What Is a QPU?]]> https://developer.nvidia.com/blog/?p=52692 2024-06-05T21:42:28Z 2022-09-07T19:00:00Z A QPU, aka a quantum processor, is the brain of a quantum computer that uses the behavior of particles like electrons or photons to make certain kinds of...]]>

A QPU, aka a quantum processor, is the brain of a quantum computer that uses the behavior of particles like electrons or photons to make certain kinds of calculations much faster than processors in today’s computers.

Source

]]>
0
Manuel Reyes-Gomez <![CDATA[Boosting AI Model Inference Performance on Azure Machine Learning]]> https://developer.nvidia.com/blog/?p=54061 2022-11-14T21:35:42Z 2022-08-29T17:00:00Z Every AI application needs a strong inference engine. Whether you’re deploying an image recognition service, intelligent virtual assistant, or a fraud...]]>

Join the NVIDIA Triton and NVIDIA TensorRT community to stay current on the latest product updates, bug fixes, content, best practices, and more. Every AI application needs a strong inference engine. Whether you’re deploying an image recognition service, intelligent virtual assistant, or a fraud detection application, a reliable inference server delivers fast, accurate…

Source

]]>
0
Tianna Nguy <![CDATA[Cybersecurity Workshops at GTC 2022]]> https://developer.nvidia.com/blog/?p=52405 2023-06-12T09:06:05Z 2022-08-29T16:30:00Z Discover the latest cybersecurity tools and trends with NVIDIA Deep Learning Institute workshops at GTC 2022.]]>

Discover the latest cybersecurity tools and trends with NVIDIA Deep Learning Institute workshops at GTC 2022.

Source

]]>
0
Tianna Nguy <![CDATA[DLI Courses: Enhance Your Skills with Hands-On Training at GTC]]> https://developer.nvidia.com/blog/?p=52431 2023-06-12T09:05:31Z 2022-08-22T16:00:00Z Select from 20 hands-on workshops, offered at GTC, available in multiple languages and time zones. Early bird pricing of just $99 ends Aug 29 (regular $500).]]>

Select from 20 hands-on workshops, offered at GTC, available in multiple languages and time zones. Early bird pricing of just $99 ends Aug 29 (regular $500).

Source

]]>
0
Nicola Sessions <![CDATA[Addressing Cybersecurity in the Enterprise with AI]]> https://developer.nvidia.com/blog/?p=51115 2023-07-11T23:10:27Z 2022-08-18T16:00:00Z Cybersecurity-related risk remains one of the top sources of risk in the enterprise. This has been exacerbated by the global pandemic, which has forced...]]>

Cybersecurity-related risk remains one of the top sources of risk in the enterprise. This has been exacerbated by the global pandemic, which has forced companies to accelerate digitization initiatives to better support a remote workforce. This includes not only the infrastructure to support a distributed workforce but also automation through robotics, data analytics, and new applications.

Source

]]>
0
Mark Freeman <![CDATA[Using Network Graphs to Visualize Potential Fraud on Ethereum Blockchain]]> https://developer.nvidia.com/blog/?p=51365 2022-09-29T17:10:41Z 2022-08-17T12:58:00Z Beyond the unimaginable prices for monkey pictures, NFT's underlying technology provides companies with a new avenue to directly monetize their online...]]>

Beyond the unimaginable prices for monkey pictures, NFT’s underlying technology provides companies with a new avenue to directly monetize their online engagements. Major brands such as Adidas, NBA, and TIME have already begun experimenting with these revenue streams using NFTs–and we are still early in this trend. As data practitioners, we are positioned to provide valuable insights into…

Source

]]>
0
Nicola Sessions <![CDATA[Upcoming Webinar: Detecting Cyber Threats with Unsupervised Learning ]]> https://developer.nvidia.com/blog/?p=51733 2023-08-18T20:27:54Z 2022-08-05T16:00:00Z Discover how to detect cyber threats using machine learning and NVIDIA Morpheus, an open-source AI framework.]]>

Discover how to detect cyber threats using machine learning and NVIDIA Morpheus, an open-source AI framework.

Source

]]>
0
Ash Bhalgat https://www.linkedin.com/in/ashbhalgat/ <![CDATA[Enabling Enterprise Cybersecurity Protection with a DPU-Accelerated, Next-Generation Firewall]]> https://developer.nvidia.com/blog/?p=50230 2023-07-11T23:10:38Z 2022-07-28T16:00:00Z Cyberattacks are gaining sophistication and are presenting an ever-growing challenge. This challenge is compounded by an increase in remote workforce...]]>

Cyberattacks are gaining sophistication and are presenting an ever-growing challenge. This challenge is compounded by an increase in remote workforce connections driving growth in secure tunneled traffic at the edge and core, the expansion of traffic encryption mandates for the federal government and healthcare networks, and an increase in video traffic. In addition, an increase in mobile…

Source

]]>
0
Ash Bhalgat https://www.linkedin.com/in/ashbhalgat/ <![CDATA[Edge Computing Is the Next Big Cybersecurity Challenge]]> https://developer.nvidia.com/blog/?p=49000 2023-06-12T09:29:22Z 2022-07-20T17:54:01Z The acceleration of digital transformation within data centers and the associated application proliferation is exposing new attack surfaces to potential...]]>

The acceleration of digital transformation within data centers and the associated application proliferation is exposing new attack surfaces to potential security threats. These new attacks typically bypass the well-established perimeter security controls such as traditional and web application firewalls, making detection and remediation of cybersecurity threats more challenging.

Source

]]>
0
André Franklin <![CDATA[Improving Enterprise IT Fraud Prevention]]> https://developer.nvidia.com/blog/?p=49053 2023-12-05T18:59:55Z 2022-06-29T15:00:00Z Any business or industry, from retail and healthcare to financial services, is subject to fraud. The cost of fraud can be staggering. Every $1 of fraud loss...]]>

Any business or industry, from retail and healthcare to financial services, is subject to fraud. The cost of fraud can be staggering. Every $1 of fraud loss costs financial firms about $4 to mitigate. Online sellers will lose $130B to online payment fraud between 2018 and 2023. By using AI and big data analytics, enterprises can efficiently prevent fraud attempts in real time.

Source

]]>
0
Judy McConnell <![CDATA[How to Evaluate AI in Your Vendor’s Cybersecurity Solution]]> https://developer.nvidia.com/blog/?p=49394 2023-07-11T23:10:48Z 2022-06-24T17:19:15Z Cybersecurity software is getting more sophisticated these days, thanks to AI and ML capabilities. It’s now possible to automate security measures without...]]>

Cybersecurity software is getting more sophisticated these days, thanks to AI and ML capabilities. It’s now possible to automate security measures without direct human intervention. The value in these powerful solutions is real—in stopping breaches, providing highly detailed alerts, and protecting attack surfaces. Still, it pays to be a skeptic. This interview with NVIDIA experts Bartley…

Source

]]>
0