Dedicated accelerator hardware for artificial intelligence and machine learning algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle important data which has value and must be protected. Many security threats exist that can compromise these assets. Fortunately, there are security techniques which can mitigate these threats.

Part 2 of this webinar series will answer the following questions:

  • What are the basic concepts at the foundation of all security systems?
  • What security building blocks are available to ensure confidentiality, integrity, authenticity and availability?
  • How can these building blocks be used to counter the threats to AI/ML accelerators?

Complete the form to watch the webinar.

 

Watch more in the Implementing Strong Security for AI/ML Accelerators series:

Part One
Part Three