Part 1 of a two-part series about securing machine learning. We’ll explore ML security through the lens of building security in. The “AI Renaissance” has been around for decades, but a resurgence in ML technology is driven by incredible modern computational power and large collections of well-organized data. In the past, I presented the software security touchpoints in order from left to right, in what I consider the best order of effectiveness: Code review, penetration testing, and risk-based security tests.”]
Source: https://www.darkreading.com/application-security/building-security-into-software/d/d-id/1338067

