{"id":13252,"date":"2022-08-04T09:49:18","date_gmt":"2022-08-04T09:49:18","guid":{"rendered":"https:\/\/www.cyber40.it\/focus-on-cybersecurity-of-ai-solutions\/"},"modified":"2022-08-04T09:49:18","modified_gmt":"2022-08-04T09:49:18","slug":"focus-on-cybersecurity-of-ai-solutions","status":"publish","type":"post","link":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/","title":{"rendered":"Focus on cybersecurity of AI solutions"},"content":{"rendered":"<p style=\"font-weight: 400;\">The cybersecurity of Machine Learning and Artificial Intelligence solutions: this is the focus of the CybersecH project, an initiative coordinated by Datrix and developed in collaboration with University of Tuscia, co-funded by Cyber 4.0 as part of its core research and innovation projects.<\/p>\n<p>AIA Guard is an end-to-end cybersecurity solution designed to defend against Artificial Intelligence Attacks (AIA) by analyzing the security and privacy risks of the entire workflow of an AI application, from dataset creation to production release of the trained model. Various modules analyze the source code and libraries used for known issues and vulnerabilities; the dataset to check that it does not contain personal and sensitive information; the endpoint where the application is released to make sure it is not an easy target for hackers; and the model to check if it is exposed to data poisoning attacks.<br \/>\nWith automated testing and a detailed report with identified risks and vulnerabilities, AIA Guard helps users become aware of issues present and proactively remediate them. <\/p>\n<p>The project is currently in the research and development phase and aims to provide users with a tool that represents the state of the art in preventing attacks against AI systems. A demo of AIA Guard will be made publicly available in the coming months. <\/p>\n<p style=\"font-weight: 400;\">\n","protected":false},"excerpt":{"rendered":"<p>The cybersecurity of Machine Learning and Artificial Intelligence solutions: this is the focus of the CybersecH project, an initiative coordinated by Datrix and developed in collaboration with University of Tuscia, co-funded by Cyber 4.0 as part of its core research&#8230;<\/p>\n","protected":false},"author":11,"featured_media":11036,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"iawp_total_views":7,"footnotes":""},"categories":[611],"tags":[],"class_list":["post-13252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Focus on cybersecurity of AI solutions - Cyber 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Focus on cybersecurity of AI solutions - Cyber 4.0\" \/>\n<meta property=\"og:description\" content=\"The cybersecurity of Machine Learning and Artificial Intelligence solutions: this is the focus of the CybersecH project, an initiative coordinated by Datrix and developed in collaboration with University of Tuscia, co-funded by Cyber 4.0 as part of its core research...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber 4.0\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-04T09:49:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cyber 4.0\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyber 4.0\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/\"},\"author\":{\"name\":\"Cyber 4.0\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\"},\"headline\":\"Focus on cybersecurity of AI solutions\",\"datePublished\":\"2022-08-04T09:49:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/\"},\"wordCount\":216,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/\",\"url\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/\",\"name\":\"Focus on cybersecurity of AI solutions - Cyber 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png\",\"datePublished\":\"2022-08-04T09:49:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png\",\"width\":1000,\"height\":1000,\"caption\":\"Copia di Copia di post Linkedin 3\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyber40.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Focus on cybersecurity of AI solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#website\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"name\":\"Cyber 4.0\",\"description\":\"Strategie e Competenze per la Cyber Sicurezza\",\"publisher\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyber40.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#organization\",\"name\":\"Cyber 4.0\",\"url\":\"https:\/\/www.cyber40.it\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"contentUrl\":\"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png\",\"width\":395,\"height\":122,\"caption\":\"Cyber 4.0\"},\"image\":{\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a\",\"name\":\"Cyber 4.0\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g\",\"caption\":\"Cyber 4.0\"},\"sameAs\":[\"https:\/\/www.cyber40.it\/\"],\"url\":\"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Focus on cybersecurity of AI solutions - Cyber 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Focus on cybersecurity of AI solutions - Cyber 4.0","og_description":"The cybersecurity of Machine Learning and Artificial Intelligence solutions: this is the focus of the CybersecH project, an initiative coordinated by Datrix and developed in collaboration with University of Tuscia, co-funded by Cyber 4.0 as part of its core research...","og_url":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/","og_site_name":"Cyber 4.0","article_published_time":"2022-08-04T09:49:18+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png","type":"image\/png"}],"author":"Cyber 4.0","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cyber 4.0","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#article","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/"},"author":{"name":"Cyber 4.0","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a"},"headline":"Focus on cybersecurity of AI solutions","datePublished":"2022-08-04T09:49:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/"},"wordCount":216,"commentCount":0,"publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/","url":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/","name":"Focus on cybersecurity of AI solutions - Cyber 4.0","isPartOf":{"@id":"https:\/\/www.cyber40.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png","datePublished":"2022-08-04T09:49:18+00:00","breadcrumb":{"@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#primaryimage","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png","width":1000,"height":1000,"caption":"Copia di Copia di post Linkedin 3"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyber40.it\/en\/focus-on-cybersecurity-of-ai-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyber40.it\/en\/"},{"@type":"ListItem","position":2,"name":"Focus on cybersecurity of AI solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.cyber40.it\/en\/#website","url":"https:\/\/www.cyber40.it\/en\/","name":"Cyber 4.0","description":"Strategie e Competenze per la Cyber Sicurezza","publisher":{"@id":"https:\/\/www.cyber40.it\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyber40.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cyber40.it\/en\/#organization","name":"Cyber 4.0","url":"https:\/\/www.cyber40.it\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","contentUrl":"https:\/\/www.cyber40.it\/wp-content\/uploads\/2023\/02\/Tavola-disegno-1_6.png","width":395,"height":122,"caption":"Cyber 4.0"},"image":{"@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cyber40\/?originalSubdomain=it"]},{"@type":"Person","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/97e752529c534ef707135f6c5f6b083a","name":"Cyber 4.0","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyber40.it\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832cf3e63ea6a46ab95d04e928846b8ab8ea91b7c3eb4e7ef3cde71afd2cc8a7?s=96&d=mm&r=g","caption":"Cyber 4.0"},"sameAs":["https:\/\/www.cyber40.it\/"],"url":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"}]}},"taxonomy_info":{"category":[{"value":611,"label":"News"}]},"featured_image_src_large":["https:\/\/www.cyber40.it\/wp-content\/uploads\/2022\/08\/Copia-di-Copia-di-post-Linkedin-3.png",1000,1000,false],"author_info":{"display_name":"Cyber 4.0","author_link":"https:\/\/www.cyber40.it\/en\/author\/cyber-4\/"},"comment_info":"","category_info":[{"term_id":611,"name":"News","slug":"news-en","term_group":0,"term_taxonomy_id":611,"taxonomy":"category","description":"","parent":0,"count":128,"filter":"raw","term_order":"0","cat_ID":611,"category_count":128,"category_description":"","cat_name":"News","category_nicename":"news-en","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/comments?post=13252"}],"version-history":[{"count":0,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/posts\/13252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media\/11036"}],"wp:attachment":[{"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/media?parent=13252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/categories?post=13252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyber40.it\/en\/wp-json\/wp\/v2\/tags?post=13252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}