Security for AI – NVIDIA Technical Blog News and tutorials for developers, data scientists, and IT admins 2025-06-03T19:39:22Z http://www.open-lab.net/blog/feed/ Leon Derczynski <![CDATA[Defining LLM Red Teaming]]> http://www.open-lab.net/blog/?p=96239 2025-04-23T02:37:15Z 2025-02-25T18:49:26Z There is an activity where people provide inputs to generative AI technologies, such as large language models (LLMs), to see if the outputs can be made to...]]> There is an activity where people provide inputs to generative AI technologies, such as large language models (LLMs), to see if the outputs can be made to...Decorative image.

There is an activity where people provide inputs to generative AI technologies, such as large language models (LLMs), to see if the outputs can be made to deviate from acceptable standards. This use of LLMs began in 2023 and has rapidly evolved to become a common industry practice and a cornerstone of trustworthy AI. How can we standardize and define LLM red teaming?

Source

]]>
0
Rich Harang <![CDATA[Agentic Autonomy Levels and Security]]> http://www.open-lab.net/blog/?p=96341 2025-04-23T02:36:53Z 2025-02-25T18:45:05Z Agentic workflows are the next evolution in AI-powered tools. They enable developers to chain multiple AI models together to perform complex activities, enable...]]> Agentic workflows are the next evolution in AI-powered tools. They enable developers to chain multiple AI models together to perform complex activities, enable...Decorative image.

Agentic workflows are the next evolution in AI-powered tools. They enable developers to chain multiple AI models together to perform complex activities, enable AI models to use tools to access additional data or automate user actions, and enable AI models to operate autonomously, analyzing and performing complex tasks with a minimum of human involvement or interaction. Because of their power��

Source

]]>
0
Charu Chaubal <![CDATA[New Whitepaper: NVIDIA AI Enterprise Security]]> http://www.open-lab.net/blog/?p=94475 2024-12-20T20:56:54Z 2024-12-20T00:41:33Z This white paper details our commitment to securing the NVIDIA AI Enterprise software stack. It outlines the processes and measures NVIDIA takes to ensure...]]> This white paper details our commitment to securing the NVIDIA AI Enterprise software stack. It outlines the processes and measures NVIDIA takes to ensure...

This white paper details our commitment to securing the NVIDIA AI Enterprise software stack. It outlines the processes and measures NVIDIA takes to ensure container security.

Source

]]>
0
Joseph Lucas <![CDATA[Sandboxing Agentic AI Workflows with WebAssembly]]> http://www.open-lab.net/blog/?p=93975 2024-12-16T21:06:56Z 2024-12-16T20:33:46Z Agentic AI workflows often involve the execution of large language model (LLM)-generated code to perform tasks like creating data visualizations. However, this...]]> Agentic AI workflows often involve the execution of large language model (LLM)-generated code to perform tasks like creating data visualizations. However, this...

Agentic AI workflows often involve the execution of large language model (LLM)-generated code to perform tasks like creating data visualizations. However, this code should be sanitized and executed in a safe environment to mitigate risks from prompt injection and errors in the returned code. Sanitizing Python with regular expressions and restricted runtimes is insufficient��

Source

]]>
0
Katherine Huang <![CDATA[Augmenting Security Operations Centers with Accelerated Alert Triage and LLM Agents Using NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=89875 2024-10-31T18:37:51Z 2024-10-24T18:02:16Z Every day, security operation center (SOC) analysts receive an overwhelming amount of incoming security alerts. To ensure the continued safety of their...]]> Every day, security operation center (SOC) analysts receive an overwhelming amount of incoming security alerts. To ensure the continued safety of their...Person looking at multiple monitors.

Every day, security operation center (SOC) analysts receive an overwhelming amount of incoming security alerts. To ensure the continued safety of their organization, they are tasked with wading through the incoming noise, triaging out false positives, and sniffing out what could be indicators of a true security breach. However, the sheer quantity of alerts may mean that important early indicators��

Source

]]>
0
Summer Liu <![CDATA[Rapidly Triage Container Security with the Vulnerability Analysis NVIDIA NIM Agent Blueprint]]> http://www.open-lab.net/blog/?p=87127 2024-10-22T20:34:00Z 2024-10-08T15:00:00Z Addressing software security issues is becoming more challenging as the number of vulnerabilities reported in the CVE database continues to grow at an...]]> Addressing software security issues is becoming more challenging as the number of vulnerabilities reported in the CVE database continues to grow at an...GIF shows the question,

Addressing software security issues is becoming more challenging as the number of vulnerabilities reported in the CVE database continues to grow at an accelerated pace. Assessing a single container for vulnerabilities requires the collection, comprehension, and synthesis of hundreds of pieces of information. With over 200K vulnerabilities reported at the end of 2023, the traditional approach to��

Source

]]>
0
Summer Liu <![CDATA[Harnessing Data with AI to Boost Zero Trust Cyber Defense]]> http://www.open-lab.net/blog/?p=89214 2024-10-28T21:54:29Z 2024-09-26T16:35:55Z Modern cyber threats have grown increasingly sophisticated, posing significant risks to federal agencies and critical infrastructure. According to Deloitte,...]]> Modern cyber threats have grown increasingly sophisticated, posing significant risks to federal agencies and critical infrastructure. According to Deloitte,...Decorative image.

Modern cyber threats have grown increasingly sophisticated, posing significant risks to federal agencies and critical infrastructure. According to Deloitte, cybersecurity is the top priority for governments and public sectors, highlighting the need to adapt to an increasingly digital world for efficiency and speed. Threat examples include insider threats, supply chain vulnerabilities��

Source

]]>
0
Becca Lynch <![CDATA[NVIDIA Presents AI Security Expertise at Leading Cybersecurity Conferences]]> http://www.open-lab.net/blog/?p=89054 2024-09-19T19:29:43Z 2024-09-18T17:03:46Z Each August, tens of thousands of security professionals attend the cutting-edge security conferences Black Hat USA and DEF CON. This year, NVIDIA AI security...]]> Each August, tens of thousands of security professionals attend the cutting-edge security conferences Black Hat USA and DEF CON. This year, NVIDIA AI security...

Each August, tens of thousands of security professionals attend the cutting-edge security conferences Black Hat USA and DEF CON. This year, NVIDIA AI security experts joined these events to share our work and learn from other members of the community. This post provides an overview of these contributions, including a keynote on the rapidly evolving AI landscape��

Source

]]>
0
Joseph Lucas <![CDATA[Defending AI Model Files from Unauthorized Access with Canaries]]> http://www.open-lab.net/blog/?p=85254 2025-02-04T19:45:15Z 2024-07-11T19:06:21Z As AI models grow in capability and cost of creation, and hold more sensitive or proprietary data, securing them at rest is increasingly important....]]> As AI models grow in capability and cost of creation, and hold more sensitive or proprietary data, securing them at rest is increasingly important....An illustration showing a securit alert.

As AI models grow in capability and cost of creation, and hold more sensitive or proprietary data, securing them at rest is increasingly important. Organizations are designing policies and tools, often as part of data loss prevention and secure supply chain programs, to protect model weights. While security engineering discussions focus on prevention (How do we prevent X?), detection (Did X��

Source

]]>
1
Joseph Lucas <![CDATA[Secure LLM Tokenizers to Maintain Application Integrity]]> http://www.open-lab.net/blog/?p=84504 2024-07-10T15:28:33Z 2024-06-27T18:00:00Z This post is part of the NVIDIA AI Red Team��s continuing vulnerability and technique research. Use the concepts presented to responsibly assess and increase...]]> This post is part of the NVIDIA AI Red Team��s continuing vulnerability and technique research. Use the concepts presented to responsibly assess and increase...

This post is part of the NVIDIA AI Red Team��s continuing vulnerability and technique research. Use the concepts presented to responsibly assess and increase the security of your AI development and deployment processes and applications. Large language models (LLMs) don��t operate over strings. Instead, prompts are passed through an often-transparent translator called a tokenizer that creates an��

Source

]]>
0
Tanya Lenz <![CDATA[Featured Cybersecurity Sessions at NVIDIA GTC 2024]]> http://www.open-lab.net/blog/?p=77736 2024-02-22T19:58:56Z 2024-02-14T20:26:51Z Discover how generative AI is powering cybersecurity solutions with enhanced speed, accuracy, and scalability.]]> Discover how generative AI is powering cybersecurity solutions with enhanced speed, accuracy, and scalability.

Discover how generative AI is powering cybersecurity solutions with enhanced speed, accuracy, and scalability.

Source

]]>
0
Nicola Sessions <![CDATA[Webinar: Improve Spear Phishing Detection with AI]]> http://www.open-lab.net/blog/?p=77126 2024-02-08T18:51:58Z 2024-01-24T18:00:00Z Learn how generative AI can help defend against spear phishing in this January 30 webinar.]]> Learn how generative AI can help defend against spear phishing in this January 30 webinar.

Learn how generative AI can help defend against spear phishing in this January 30 webinar.

Source

]]>
0
Rich Harang <![CDATA[Best Practices for Securing LLM-Enabled Applications]]> http://www.open-lab.net/blog/?p=73609 2024-07-08T20:07:28Z 2023-11-15T18:00:00Z Large language models (LLMs) provide a wide range of powerful enhancements to nearly any application that processes text. And yet they also introduce new risks,...]]> Large language models (LLMs) provide a wide range of powerful enhancements to nearly any application that processes text. And yet they also introduce new risks,...

Large language models (LLMs) provide a wide range of powerful enhancements to nearly any application that processes text. And yet they also introduce new risks, including: This post walks through these security vulnerabilities in detail and outlines best practices for designing or evaluating a secure LLM-enabled application. Prompt injection is the most common and well-known��

Source

]]>
0
Will Pearce <![CDATA[NVIDIA AI Red Team: Machine Learning Security Training]]> http://www.open-lab.net/blog/?p=71491 2024-07-08T20:05:26Z 2023-10-19T20:26:15Z At Black Hat USA 2023, NVIDIA hosted a two-day training session that provided security professionals with a realistic environment and methodology to explore the...]]> At Black Hat USA 2023, NVIDIA hosted a two-day training session that provided security professionals with a realistic environment and methodology to explore the...Picture of the ML security training classroom at Black Hat USA

At Black Hat USA 2023, NVIDIA hosted a two-day training session that provided security professionals with a realistic environment and methodology to explore the unique risks presented by machine learning (ML) in today��s environments. In this post, the NVIDIA AI Red Team shares what was covered during the training and other opportunities to continue learning about ML security.

Source

]]>
5
Joseph Lucas <![CDATA[Analyzing the Security of Machine Learning Research Code]]> http://www.open-lab.net/blog/?p=71113 2024-07-08T21:33:52Z 2023-10-04T18:00:00Z The NVIDIA AI Red Team is focused on scaling secure development practices across the data, science, and AI ecosystems. We participate in open-source security...]]> The NVIDIA AI Red Team is focused on scaling secure development practices across the data, science, and AI ecosystems. We participate in open-source security...

The NVIDIA AI Red Team is focused on scaling secure development practices across the data, science, and AI ecosystems. We participate in open-source security initiatives, release tools, present at industry conferences, host educational competitions, and provide innovative training. Covering 3 years and totaling almost 140GB of source code, the recently released Meta Kaggle for Code dataset is��

Source

]]>
2
Shawn Davis <![CDATA[Generative AI and Accelerated Computing for Spear Phishing Detection]]> http://www.open-lab.net/blog/?p=70728 2023-10-05T18:18:13Z 2023-09-12T18:00:00Z Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported...]]> Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported...

Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported losses in the United States alone. Business e-mail compromises led to $2.4 billion in costs in 2021, according to the FBI Internet Crime Report. In the period from June 2016 to December 2021, costs related to phishing and spear phishing totaled��

Source

]]>
0
Rich Harang <![CDATA[Securing LLM Systems Against Prompt Injection]]> http://www.open-lab.net/blog/?p=68819 2024-07-08T20:08:30Z 2023-08-03T18:43:12Z Prompt injection is a new attack technique specific to large language models (LLMs) that enables attackers to manipulate the output of the LLM. This attack is...]]> Prompt injection is a new attack technique specific to large language models (LLMs) that enables attackers to manipulate the output of the LLM. This attack is...

Prompt injection is a new attack technique specific to large language models (LLMs) that enables attackers to manipulate the output of the LLM. This attack is made more dangerous by the way that LLMs are increasingly being equipped with ��plug-ins�� for better responding to user requests by accessing up-to-date information, performing complex calculations, and calling on external services through��

Source

]]>
0
Will Pearce <![CDATA[NVIDIA AI Red Team: An Introduction]]> http://www.open-lab.net/blog/?p=66214 2024-07-08T20:06:41Z 2023-06-14T22:00:16Z Machine learning has the promise to improve our world, and in many ways it already has. However, research and lived experiences continue to show this technology...]]> Machine learning has the promise to improve our world, and in many ways it already has. However, research and lived experiences continue to show this technology...Two men working at a desktop computer in an office.

Machine learning has the promise to improve our world, and in many ways it already has. However, research and lived experiences continue to show this technology has risks. Capabilities that used to be restricted to science fiction and academia are increasingly available to the public. The responsible use and development of AI requires categorizing, assessing, and mitigating enumerated risks where��

Source

]]>
0
Rajesh Gadiyar <![CDATA[A New Frontier for 5G Network Security]]> http://www.open-lab.net/blog/?p=64752 2024-03-13T17:47:18Z 2023-05-31T18:45:11Z Wireless technology has evolved rapidly and the 5G deployments have made good progress around the world. Up until recently, wireless RAN was deployed using...]]> Wireless technology has evolved rapidly and the 5G deployments have made good progress around the world. Up until recently, wireless RAN was deployed using...Decorative image of networks.

Wireless technology has evolved rapidly and the 5G deployments have made good progress around the world. Up until recently, wireless RAN was deployed using closed-box appliance solutions by traditional RAN vendors. This closed-box approach is not scalable, underuses the infrastructure, and does not deliver optimal RAN TCO. It has many shortcomings. We have come to realize that such closed-box��

Source

]]>
0
David Wills <![CDATA[Transforming IPsec Deployments with NVIDIA DOCA 2.0]]> http://www.open-lab.net/blog/?p=64076 2023-06-13T17:10:25Z 2023-05-09T16:30:00Z Announced in March 2023, NVIDIA DOCA 2.0, the newest release of the NVIDIA SDK for BlueField DPUs, is now available. Together, NVIDIA DOCA and BlueField DPUs...]]> Announced in March 2023, NVIDIA DOCA 2.0, the newest release of the NVIDIA SDK for BlueField DPUs, is now available. Together, NVIDIA DOCA and BlueField DPUs...

Announced in March 2023, NVIDIA DOCA 2.0, the newest release of the NVIDIA SDK for BlueField DPUs, is now available. Together, NVIDIA DOCA and BlueField DPUs accelerate the development of applications that deliver breakthrough networking, security, and storage performance with a comprehensive, open development platform. NVIDIA DOCA 2.0 includes newly added support for the BlueField-3 Data��

Source

]]>
0
Tim Lustig <![CDATA[Accelerating Redis Performance Using VMware vSphere 8 and NVIDIA BlueField DPUs]]> http://www.open-lab.net/blog/?p=64109 2023-07-05T19:47:04Z 2023-05-05T16:00:00Z A shift to modern distributed workloads, along with higher networking speeds, has increased the overhead of infrastructure services. There are fewer CPU cycles...]]> A shift to modern distributed workloads, along with higher networking speeds, has increased the overhead of infrastructure services. There are fewer CPU cycles...

A shift to modern distributed workloads, along with higher networking speeds, has increased the overhead of infrastructure services. There are fewer CPU cycles available for the applications that power businesses. Deploying data processing units (DPUs) to offload and accelerate these infrastructure services delivers faster performance, lower CPU utilization, and better energy efficiency.

Source

]]>
0
Moran Gonen <![CDATA[Accelerating the Suricata IDS/IPS with NVIDIA BlueField DPUs]]> http://www.open-lab.net/blog/?p=63811 2023-05-18T18:22:57Z 2023-05-04T18:45:02Z Deep packet inspection (DPI) is a critical technology for network security that enables the inspection and analysis of data packets as they travel across a...]]> Deep packet inspection (DPI) is a critical technology for network security that enables the inspection and analysis of data packets as they travel across a...

Deep packet inspection (DPI) is a critical technology for network security that enables the inspection and analysis of data packets as they travel across a network. By examining the content of these packets, DPI can identify potential security threats such as malware, viruses, and malicious traffic, and prevent them from infiltrating the network. However, the implementation of DPI also comes with��

Source

]]>
10
Igor Miroshnichenko <![CDATA[Diagnosing Network Issues Faster with NVIDIA WJH]]> http://www.open-lab.net/blog/?p=64050 2023-05-23T23:56:01Z 2023-05-04T17:02:54Z AI has seamlessly integrated into our lives and changed us in ways we couldn't even imagine just a few years ago. In the past, the perception of AI was...]]> AI has seamlessly integrated into our lives and changed us in ways we couldn't even imagine just a few years ago. In the past, the perception of AI was...

AI has seamlessly integrated into our lives and changed us in ways we couldn��t even imagine just a few years ago. In the past, the perception of AI was something futuristic and complex. Only giant corporations used AI on their supercomputers with HPC technologies to forecast weather and make breakthrough discoveries in healthcare and science. Today, thanks to GPUs, CPUs, high-speed storage��

Source

]]>
0
Annamalai Chockalingam <![CDATA[NVIDIA Enables Trustworthy, Safe, and Secure Large Language Model Conversational Systems]]> http://www.open-lab.net/blog/?p=63745 2024-11-20T23:04:35Z 2023-04-25T13:00:00Z Large language models (LLMs) are incredibly powerful and capable of answering complex questions, performing feats of creative writing, developing, debugging...]]> Large language models (LLMs) are incredibly powerful and capable of answering complex questions, performing feats of creative writing, developing, debugging...NeMo Guardrails illustration.

Large language models (LLMs) are incredibly powerful and capable of answering complex questions, performing feats of creative writing, developing, debugging source code, and so much more. You can build incredibly sophisticated LLM applications by connecting them to external tools, for example reading data from a real-time source, or enabling an LLM to decide what action to take given a user��s��

Source

]]>
1
Itay Ozery <![CDATA[Transform the Data Center for the AI Era with NVIDIA DPUs and NVIDIA DOCA]]> http://www.open-lab.net/blog/?p=62095 2023-10-23T17:20:53Z 2023-03-21T17:00:00Z NVIDIA BlueField-3 data processing units (DPUs) are now in full production, and have been selected by Oracle Cloud Infrastructure (OCI) to achieve higher...]]> NVIDIA BlueField-3 data processing units (DPUs) are now in full production, and have been selected by Oracle Cloud Infrastructure (OCI) to achieve higher...NVIDIA DGX SuperPOD with NVIDIA BlueField-3 DPUs

NVIDIA BlueField-3 data processing units (DPUs) are now in full production, and have been selected by Oracle Cloud Infrastructure (OCI) to achieve higher performance, better efficiency, and stronger security, as announced at NVIDIA GTC 2023. As a 400 Gb/s infrastructure compute platform, BlueField-3 enables organizations to deploy and operate data centers at massive scale.

Source

]]>
0
Nicola Sessions <![CDATA[NVIDIA Morpheus Helps Defend Against Spear Phishing with Generative AI]]> http://www.open-lab.net/blog/?p=62189 2023-03-23T17:12:11Z 2023-03-21T16:50:53Z Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and...]]> Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and...Mail icon GIF

Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and with extremely short training times. In fact, using NVIDIA Morpheus and a generative AI training technique, we were able to detect 90% of targeted spear phishing emails��a 20% improvement compared to a typical phishing detection solution��

Source

]]>
2
Rachel Allen https://www.linkedin.com/in/rachel-kay-allen-913b5696/%20 <![CDATA[From Neuroscience to Data Science: My Road Into Cybersecurity]]> http://www.open-lab.net/blog/?p=61604 2023-03-14T18:21:43Z 2023-03-14T16:00:00Z If you asked a group of cybersecurity professionals how they got into the field, you might be surprised by the answers that you receive. With military officers,...]]> If you asked a group of cybersecurity professionals how they got into the field, you might be surprised by the answers that you receive. With military officers,...person typing at computer.

If you asked a group of cybersecurity professionals how they got into the field, you might be surprised by the answers that you receive. With military officers, program managers, technical writers, and IT practitioners, their backgrounds are varied. There is no single path into a cybersecurity career, let alone one that incorporates both cybersecurity and AI. I��ve always been��

Source

]]>
0
Dylan Makowski <![CDATA[Detecting Malware with Purple Team Collaboration]]> http://www.open-lab.net/blog/?p=61661 2023-03-10T20:34:53Z 2023-03-10T21:00:00Z When it comes to new malware written in esoteric programming languages, Blue Team defenders have very little chance to ensure that all endpoints in their...]]> When it comes to new malware written in esoteric programming languages, Blue Team defenders have very little chance to ensure that all endpoints in their...Cybersecurity abstract image

When it comes to new malware written in esoteric programming languages, Blue Team defenders have very little chance to ensure that all endpoints in their organization are able to detect and/or mitigate this malware. Security professionals have quickly recognized this issue and have built an effective pipeline to identify new releases of unique malware and develop detections for them.

Source

]]>
0
Rick Merritt <![CDATA[Explainer: What Is Confidential Computing?]]> http://www.open-lab.net/blog/?p=61586 2024-06-05T22:13:41Z 2023-03-08T20:00:00Z Confidential computing is a way of processing data in a protected zone of a computer��s processor, often inside a remote edge or public cloud server, and...]]> Confidential computing is a way of processing data in a protected zone of a computer��s processor, often inside a remote edge or public cloud server, and...

Confidential computing is a way of processing data in a protected zone of a computer��s processor, often inside a remote edge or public cloud server, and proving that no one viewed or altered the work.

Source

]]>
0
Joseph Lucas <![CDATA[Evaluating the Security of Jupyter Environments]]> http://www.open-lab.net/blog/?p=60938 2024-07-09T15:25:19Z 2023-02-13T20:30:00Z How can you tell if your Jupyter instance is secure? The NVIDIA AI Red Team has developed a JupyterLab extension to automatically assess the security of Jupyter...]]> How can you tell if your Jupyter instance is secure? The NVIDIA AI Red Team has developed a JupyterLab extension to automatically assess the security of Jupyter...

How can you tell if your Jupyter instance is secure? The NVIDIA AI Red Team has developed a JupyterLab extension to automatically assess the security of Jupyter environments. jupysec is a tool that evaluates the user��s environment against almost 100 rules that detect configurations and artifacts that have been identified by the AI Red Team as potential vulnerabilities, attack vectors��

Source

]]>
0
Elad Mentovich <![CDATA[NVIDIA Steps Up Network Security with Research in Quantum Keys]]> http://www.open-lab.net/blog/?p=58511 2023-02-23T19:39:27Z 2023-02-09T18:00:00Z As part of NVIDIA efforts to advance research towards a more secure data center, the NVIDIA Advanced Development Group is conducting research on quantum key...]]> As part of NVIDIA efforts to advance research towards a more secure data center, the NVIDIA Advanced Development Group is conducting research on quantum key...

As part of NVIDIA efforts to advance research towards a more secure data center, the NVIDIA Advanced Development Group is conducting research on quantum key distribution (QKD) technologies, along with other top organizations in Europe and in Israel. The initiatives are funded by the European Union��s Horizon 2020 program and the Israel Innovation Authority. QKD is a highly secure cryptographic��

Source

]]>
0
Dylan Makowski <![CDATA[Exploiting and Securing Jenkins Instances at Scale with GroovyWaiter]]> http://www.open-lab.net/blog/?p=60007 2023-02-13T18:16:38Z 2023-01-24T18:30:00Z Jenkins CI/CD solution provides a way for developers to create an automated, scalable, and highly configurable pipeline to ensure that code bases stay...]]> Jenkins CI/CD solution provides a way for developers to create an automated, scalable, and highly configurable pipeline to ensure that code bases stay...Laptop screen with script

Jenkins CI/CD solution provides a way for developers to create an automated, scalable, and highly configurable pipeline to ensure that code bases stay up-to-date and can be pushed out with very little effort. When a developer pushes new commits to any code, Jenkins can pick up on those changes and run a series of tests and builds, then ship it to production in one seamless pipeline.

Source

]]>
0
Matan Raz <![CDATA[Developers Design Innovative Network Security Solutions at the NVIDIA Cybersecurity Hackathon]]> http://www.open-lab.net/blog/?p=58662 2023-02-13T17:10:06Z 2022-12-14T17:00:00Z The latest NVIDIA Cybersecurity Hackathon brought together 10 teams to create exciting cybersecurity innovations using the NVIDIA Morpheus cybersecurity AI...]]> The latest NVIDIA Cybersecurity Hackathon brought together 10 teams to create exciting cybersecurity innovations using the NVIDIA Morpheus cybersecurity AI...

The latest NVIDIA Cybersecurity Hackathon brought together 10 teams to create exciting cybersecurity innovations using the NVIDIA Morpheus cybersecurity AI framework, NVIDIA BlueField data processing unit (DPU), and NVIDIA DOCA. The event featured seven onsite Israeli teams and three remote teams from India and the UK. Working around the clock for 24 hours, the teams were challenged with��

Source

]]>
1
Joseph Lucas <![CDATA[Improving Machine Learning Security Skills at a DEF CON Competition]]> http://www.open-lab.net/blog/?p=57692 2024-07-09T16:36:32Z 2022-11-30T21:00:00Z Machine learning (ML) security is a new discipline focused on the security of machine learning systems and the data they are built upon. It exists at the...]]> Machine learning (ML) security is a new discipline focused on the security of machine learning systems and the data they are built upon. It exists at the...Letters, numbers, and padlocks on black background

Machine learning (ML) security is a new discipline focused on the security of machine learning systems and the data they are built upon. It exists at the intersection of the information security and data science domains. While the state-of-the-art moves forward, there is no clear onboarding and learning path for securing and testing machine learning systems. How, then��

Source

]]>
0
Rama Darbha <![CDATA[Achieve Innovative Hyperconverged Networking with NVIDIA Spectrum Ethernet and Microsoft Azure Stack HCI]]> http://www.open-lab.net/blog/?p=56256 2023-11-29T23:20:22Z 2022-10-25T16:00:00Z Enterprises of all sizes are increasingly leveraging virtualization and hyperconverged infrastructure (HCI). This technology delivers reliable and secure...]]> Enterprises of all sizes are increasingly leveraging virtualization and hyperconverged infrastructure (HCI). This technology delivers reliable and secure...

Enterprises of all sizes are increasingly leveraging virtualization and hyperconverged infrastructure (HCI). This technology delivers reliable and secure compute resources for operations while reducing data center footprint. HCI clusters rely on robust, feature-rich networking fabrics to deliver on-premises solutions that can seamlessly connect to the cloud. Microsoft Azure Stack HCI is a��

Source

]]>
3
Yam Gellis <![CDATA[Calculating and Synchronizing Time?with the Precision Timing Protocol on the NVIDIA Spectrum Switch]]> http://www.open-lab.net/blog/?p=54221 2023-06-12T09:01:16Z 2022-09-09T15:46:47Z PTP uses an algorithm and method for synchronizing clocks on various devices across packet-based networks to provide submicrosecond accuracy. NVIDIA Spectrum...]]> PTP uses an algorithm and method for synchronizing clocks on various devices across packet-based networks to provide submicrosecond accuracy. NVIDIA Spectrum...

PTP uses an algorithm and method for synchronizing clocks on various devices across packet-based networks to provide submicrosecond accuracy. NVIDIA Spectrum supports PTP in both one-step and two-step modes and can serve either as a boundary or a transparent clock. Here��s how the switch calculates and synchronizes time in one-step mode when acting as a transparent clock. Later in this post��

Source

]]>
0
Ash Bhalgat https://www.linkedin.com/in/ashbhalgat/ <![CDATA[Enabling Enterprise Cybersecurity Protection with a DPU-Accelerated, Next-Generation Firewall]]> http://www.open-lab.net/blog/?p=50230 2023-07-11T23:10:38Z 2022-07-28T16:00:00Z Cyberattacks are gaining sophistication and are presenting an ever-growing challenge. This challenge is compounded by an increase in remote workforce...]]> Cyberattacks are gaining sophistication and are presenting an ever-growing challenge. This challenge is compounded by an increase in remote workforce...

Cyberattacks are gaining sophistication and are presenting an ever-growing challenge. This challenge is compounded by an increase in remote workforce connections driving growth in secure tunneled traffic at the edge and core, the expansion of traffic encryption mandates for the federal government and healthcare networks, and an increase in video traffic. In addition, an increase in mobile��

Source

]]>
0
Ash Bhalgat https://www.linkedin.com/in/ashbhalgat/ <![CDATA[Edge Computing Is the Next Big Cybersecurity Challenge]]> http://www.open-lab.net/blog/?p=49000 2023-06-12T09:29:22Z 2022-07-20T17:54:01Z The acceleration of digital transformation within data centers and the associated application proliferation is exposing new attack surfaces to potential...]]> The acceleration of digital transformation within data centers and the associated application proliferation is exposing new attack surfaces to potential...F5 joined the NVIDIA GTC to discuss the real-time pre-processing of telemetry data generated from BlueField DPUs

The acceleration of digital transformation within data centers and the associated application proliferation is exposing new attack surfaces to potential security threats. These new attacks typically bypass the well-established perimeter security controls such as traditional and web application firewalls, making detection and remediation of cybersecurity threats more challenging.

Source

]]>
0
Judy McConnell <![CDATA[How to Evaluate AI in Your Vendor��s Cybersecurity Solution]]> http://www.open-lab.net/blog/?p=49394 2023-07-11T23:10:48Z 2022-06-24T17:19:15Z Cybersecurity software is getting more sophisticated these days, thanks to AI and ML capabilities. It��s now possible to automate security measures without...]]> Cybersecurity software is getting more sophisticated these days, thanks to AI and ML capabilities. It��s now possible to automate security measures without...

Cybersecurity software is getting more sophisticated these days, thanks to AI and ML capabilities. It��s now possible to automate security measures without direct human intervention. The value in these powerful solutions is real��in stopping breaches, providing highly detailed alerts, and protecting attack surfaces. Still, it pays to be a skeptic. This interview with NVIDIA experts Bartley��

Source

]]>
0
Scott Ciccone <![CDATA[Stop Modern Security Attacks in Real Time with ARIA Cybersecurity and NVIDIA]]> http://www.open-lab.net/blog/?p=48984 2022-06-16T17:05:53Z 2022-06-07T22:59:59Z Today��s cybersecurity landscape is changing in waves with threat and attack methods putting the business world on high alert. Modern attacks continue to gain...]]> Today��s cybersecurity landscape is changing in waves with threat and attack methods putting the business world on high alert. Modern attacks continue to gain...

Today��s cybersecurity landscape is changing in waves with threat and attack methods putting the business world on high alert. Modern attacks continue to gain sophistication, staying one step ahead of traditional cyber defense measures, by continuously altering attack techniques. With the increasing use of AI, ML, 5G, and IoT, network speeds readily run at 100G rates or more.

Source

]]>
0
Chintan Patel <![CDATA[New on NGC: Security Reports, Latest Containers for PyTorch, TensorFlow, HPC and More]]> http://www.open-lab.net/blog/?p=43583 2023-02-13T18:55:40Z 2022-01-26T22:54:42Z The NVIDIA NGC catalog is a hub for GPU-optimized deep learning, machine learning, and HPC applications. With highly performant software containers, pretrained...]]> The NVIDIA NGC catalog is a hub for GPU-optimized deep learning, machine learning, and HPC applications. With highly performant software containers, pretrained...

The NVIDIA NGC catalog is a hub for GPU-optimized deep learning, machine learning, and HPC applications. With highly performant software containers, pretrained models, industry-specific SDKs, and Jupyter Notebooks the content helps simplify and accelerate end-to-end workflows. New features, software, and updates to help you streamline your workflow and build your solutions faster on NGC��

Source

]]>
0
Maor Idan <![CDATA[Close Knowledge Gaps and Elevate Training with Digital Twin NVIDIA Air]]> http://www.open-lab.net/blog/?p=36958 2022-08-21T23:52:36Z 2021-11-15T17:02:00Z Training resources are always a challenge for IT departments. There is a fine line between letting new team members do more without supervision and keeping the...]]> Training resources are always a challenge for IT departments. There is a fine line between letting new team members do more without supervision and keeping the...4 people sitting around laptops in an office.

Training resources are always a challenge for IT departments. There is a fine line between letting new team members do more without supervision and keeping the lights on by making sure no mistakes are made in the production environment. Leaning towards the latter method and limiting new team members�� access to production deployments may lead to knowledge gaps. How can new team members learn if��

Source

]]>
0
Piyush Modi <![CDATA[NVIDIA GTC: Industrial at the Edge]]> http://www.open-lab.net/blog/?p=38611 2022-08-21T23:52:48Z 2021-10-14T19:45:00Z AI is transforming the industrial sector. From design, supply chain, and manufacturing, to servicing of mission-critical assets, AI is expected to add $4.8...]]> AI is transforming the industrial sector. From design, supply chain, and manufacturing, to servicing of mission-critical assets, AI is expected to add $4.8...

AI is transforming the industrial sector. From design, supply chain, and manufacturing, to servicing of mission-critical assets, AI is expected to add $4.8 trillion worth of economic value. The industrial use cases are rich and range from finding anomalies, detecting defects, predicting the health of factory and field assets, to detecting deviations in complex processes monitored by 1000s��

Source

]]>
0
Amanda Saunders <![CDATA[NVIDIA GTC: Taking It to the Edge]]> http://www.open-lab.net/blog/?p=38078 2023-02-10T22:11:13Z 2021-10-14T16:30:00Z Today the terms Internet of Things (IoT), 5G, and edge computing are everywhere. With the explosive growth in IoT devices, the emergence of true 5G capable...]]> Today the terms Internet of Things (IoT), 5G, and edge computing are everywhere. With the explosive growth in IoT devices, the emergence of true 5G capable...GTC promo with airplane taking advantage of edge computing.

Today the terms Internet of Things (IoT), 5G, and edge computing are everywhere. With the explosive growth in IoT devices, the emergence of true 5G capable networks, and the growth in AI, organizations are trying to figure out how to use these trends to help them get ahead. As the leader in AI, NVIDIA is bringing these topics to the forefront of our annual NVIDIA GTC, taking place November 8��

Source

]]>
0
Daniel Rohrer <![CDATA[Edge Computing: Considerations for Security Architects]]> http://www.open-lab.net/blog/?p=37991 2023-07-11T23:11:46Z 2021-10-04T18:36:00Z Data is increasingly being generated at remote edge locations out of reach from traditional data center solutions. To take advantage of these sources of data,...]]> Data is increasingly being generated at remote edge locations out of reach from traditional data center solutions. To take advantage of these sources of data,...Illustration of edge security.

Data is increasingly being generated at remote edge locations out of reach from traditional data center solutions. To take advantage of these sources of data, companies adopt edge computing by moving computing power and storage closer to where the data is collected. This decreases bandwidth costs and latency when streaming data back to a data center or cloud. Edge computing delivers applications��

Source

]]>
1
Ariel Kit <![CDATA[Accelerating Data Center Security with BlueField-2 DPU]]> http://www.open-lab.net/blog/?p=37146 2022-08-21T23:52:37Z 2021-09-09T20:37:40Z Data Processing Units, or DPUs, are the new foundation for a comprehensive and innovative security offering. The hyperscale giants and telecom providers have...]]> Data Processing Units, or DPUs, are the new foundation for a comprehensive and innovative security offering. The hyperscale giants and telecom providers have...

Data Processing Units, or DPUs, are the new foundation for a comprehensive and innovative security offering. The hyperscale giants and telecom providers have adopted this strategy for building and securing highly efficient cloud data centers, and it��s now available for enterprise customers. This strategy has revolutionized the approach to minimize risks and enforce security policies inside the��

Source

]]>
0
Amanda Saunders <![CDATA[Considerations for Deploying AI at the Edge]]> http://www.open-lab.net/blog/?p=37124 2023-07-27T19:55:35Z 2021-09-07T19:15:58Z The growth of edge computing has been a hot topic in many industries. The value of smart infrastructure can mean improvements to overall operational efficiency,...]]> The growth of edge computing has been a hot topic in many industries. The value of smart infrastructure can mean improvements to overall operational efficiency,...

The growth of edge computing has been a hot topic in many industries. The value of smart infrastructure can mean improvements to overall operational efficiency, safety, and even the bottom line. However, not all workloads need to be or even should be, deployed at the edge. Enterprises use a combination of edge computing and cloud computing when developing and deploying AI applications.

Source

]]>
0
John F. Kim <![CDATA[Offloading and Isolating Data Center Workloads with NVIDIA Bluefield DPU]]> http://www.open-lab.net/blog/?p=36453 2022-08-21T23:52:32Z 2021-08-19T18:00:36Z Today��s data centers are evolving rapidly and require new types of processors called data processing units (DPUs). The new requirements demand a specific type...]]> Today��s data centers are evolving rapidly and require new types of processors called data processing units (DPUs). The new requirements demand a specific type...

Today��s data centers are evolving rapidly and require new types of processors called data processing units (DPUs). The new requirements demand a specific type of DPU architecture, capable of offloading, accelerating, and isolating specific workloads. On August 23 at the Hot Chips 33 conference, NVIDIA silicon architect Idan Burstein discusses changing data center requirements and how they have��

Source

]]>
1
Kevin Deierling <![CDATA[Achieving a Cloud-Scale Architecture with DPUs]]> http://www.open-lab.net/blog/?p=24852 2022-08-21T23:41:09Z 2021-06-18T19:01:08Z This post was originally published on the Mellanox blog. In the first post of this series, I argued that it is a function and not a form that distinguishes a...]]> This post was originally published on the Mellanox blog. In the first post of this series, I argued that it is a function and not a form that distinguishes a...

This post was originally published on the Mellanox blog. In the first post of this series, I argued that it is a function and not a form that distinguishes a SmartNIC from a data processing unit (DPU). I introduced the category of datacenter NICs called SmartNICs, which include both hardware transport and a programmable data path for virtual switch acceleration.

Source

]]>
0
Tom Drabas <![CDATA[Cybersecurity Analysis �C Beginner��s Guide to Processing Security Logs in Python]]> http://www.open-lab.net/blog/?p=25367 2024-05-07T19:27:35Z 2021-05-26T17:00:00Z This is the last installment of the series of articles on the RAPIDS ecosystem. The series explores and discusses various aspects of RAPIDS that allow its users...]]> This is the last installment of the series of articles on the RAPIDS ecosystem. The series explores and discusses various aspects of RAPIDS that allow its users...

This is the last installment of the series of articles on the RAPIDS ecosystem. The series explores and discusses various aspects of RAPIDS that allow its users solve ETL (Extract, Transform, Load) problems, build ML (Machine Learning) and DL (Deep Learning) models, explore expansive graphs, process signal and system log, or use SQL language via BlazingSQL to process data.

Source

]]>
0
John F. Kim <![CDATA[Accelerating Solution Development with DOCA on NVIDIA BlueField DPUs]]> http://www.open-lab.net/blog/?p=29855 2023-03-22T01:11:57Z 2021-04-12T19:13:00Z DOCA is a software framework for developing applications on BlueField DPUs. By using DOCA, you can offload infrastructure workloads from the host CPU and...]]> DOCA is a software framework for developing applications on BlueField DPUs. By using DOCA, you can offload infrastructure workloads from the host CPU and...

DOCA is a software framework for developing applications on BlueField DPUs. By using DOCA, you can offload infrastructure workloads from the host CPU and accelerate them with the BlueField DPU. This enables an infrastructure that is software-defined yet hardware accelerated, maximizing both performance and flexibility in the data center. NVIDIA first introduced DOCA in October 2020.

Source

]]>
0
Bartley Richardson https://www.linkedin.com/in/bartleyrichardson/%20 <![CDATA[Cybersecurity Framework: An Introduction to NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=30294 2023-03-22T01:11:56Z 2021-04-12T19:13:00Z NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI...]]> NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI...

NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI capabilities. Morpheus allows developers for the first time to instantaneously inspect all IP network communications through their data center fabric. Attacks are becoming more and more frequent and dangerous despite the advancements in��

Source

]]>
1
Ash Bhalgat https://www.linkedin.com/in/ashbhalgat/ <![CDATA[GTC 21: 5 Data Center Networking and Ecosystem Sessions You Shouldn��t Miss!]]> http://www.open-lab.net/blog/?p=29954 2023-10-25T22:54:03Z 2021-04-05T17:16:00Z As NVIDIA CEO Jensen Huang stated in last year��s GTC, ��the data center is the new unit of computing.�� Traditional way of using the server as the unit of...]]> As NVIDIA CEO Jensen Huang stated in last year��s GTC, ��the data center is the new unit of computing.�� Traditional way of using the server as the unit of...

As NVIDIA CEO Jensen Huang stated in last year��s GTC, ��the data center is the new unit of computing.�� Traditional way of using the server as the unit of computing is fading away quickly. More and more applications are moving to data centers that are located at the edge, in different availability zones or in private enterprise clouds. Modern workloads such as AI/ML, edge computing��

Source

]]>
0
Dan Nurmi <![CDATA[Maintaining Container Security as the Core of NGC with Anchore Enterprise]]> http://www.open-lab.net/blog/?p=25447 2023-07-27T19:57:11Z 2021-03-30T22:32:00Z Containers have quickly gained strong adoption in the software development and deployment process and has truly enabled us to manage software complexity. It is...]]> Containers have quickly gained strong adoption in the software development and deployment process and has truly enabled us to manage software complexity. It is...F5 joined the NVIDIA GTC to discuss the real-time pre-processing of telemetry data generated from BlueField DPUs

Containers have quickly gained strong adoption in the software development and deployment process and has truly enabled us to manage software complexity. It is not surprising that, by a recent Gartner report, more than 70% of global organizations will be running containerized applications in production by 2023. That��s up from less than 20% in 2019. However, containers also bring security��

Source

]]>
1
Ash Bhalgat https://www.linkedin.com/in/ashbhalgat/ <![CDATA[Deploying Time-Sensitive 5G Networks at the Dawn of AI for Telcos]]> http://www.open-lab.net/blog/?p=24151 2023-10-23T17:23:04Z 2021-03-09T00:34:53Z Telecommunication (telco) providers are undergoing a business transformation. They��re replacing the traditional network infrastructure that lacks agility,...]]> Telecommunication (telco) providers are undergoing a business transformation. They��re replacing the traditional network infrastructure that lacks agility,...

Telecommunication (telco) providers are undergoing a business transformation. They��re replacing the traditional network infrastructure that lacks agility, flexibility, and efficiency with commercial off-the-shelf (COTS) white box servers to assist in implementing 5G and modernizing data centers. 5G is the foundation for boosting network capacity and bandwidth but will overwhelm current network��

Source

]]>
0
Erik Bohnhorst <![CDATA[Adding More Support in NVIDIA GPU Operator]]> http://www.open-lab.net/blog/?p=23095 2023-04-04T17:00:41Z 2021-01-26T23:12:47Z Editor's note: Interested in GPU Operator? Register for our upcoming webinar on January 20th, "How to Easily use GPUs with Kubernetes". Reliably provisioning...]]> Editor's note: Interested in GPU Operator? Register for our upcoming webinar on January 20th, "How to Easily use GPUs with Kubernetes". Reliably provisioning...

Editor��s note: Interested in GPU Operator? Register for our upcoming webinar on January 20th, ��How to Easily use GPUs with Kubernetes��. Reliably provisioning servers with GPUs can quickly become complex as multiple components must be installed and managed to use GPUs with Kubernetes. The GPU Operator simplifies the initial deployment and management and is based on the Operator Framework.

Source

]]>
0
Ash Bhalgat https://www.linkedin.com/in/ashbhalgat/ <![CDATA[Accelerating Connection Tracking to Turbo-Charge Stateful Security]]> http://www.open-lab.net/blog/?p=22919 2023-07-11T23:12:08Z 2021-01-21T00:59:20Z Public cloud and telecommunication service providers are moving in the direction of large hyperscale datacenters like Google and Amazon. They are looking for...]]> Public cloud and telecommunication service providers are moving in the direction of large hyperscale datacenters like Google and Amazon. They are looking for...

Public cloud and telecommunication service providers are moving in the direction of large hyperscale datacenters like Google and Amazon. They are looking for ways to increase efficiencies, flexibility, and agility, and so are turning towards disaggregation and server virtualization as critical tenets of their modernization efforts. However, in doing so, they are stumbling across several challenges.

Source

]]>
0
Ahmad Atamli <![CDATA[Detecting Out-of-Band Malware with NVIDIA BlueField DPU]]> http://www.open-lab.net/blog/?p=22051 2022-08-21T23:40:46Z 2021-01-14T18:22:00Z In an era where cyberthreats are around every corner and with increasing attacks on data centers, security has become an essential element to include in every...]]> In an era where cyberthreats are around every corner and with increasing attacks on data centers, security has become an essential element to include in every...

In an era where cyberthreats are around every corner and with increasing attacks on data centers, security has become an essential element to include in every machine guarding user data. However, many security offerings are defenseless in the presence of malware. Furthermore, software-based security consumes compute and memory resources that should be allocated to users.

Source

]]>
1
���˳���97caoporen����