Cybersecurity

Ophélie Surcouf
Members Public

Confidential Computing: A History

Here, we provide a deep dive into Confidential Computing, how it can protect data privacy, and where it comes from?

Daniel Huynh
Members Public

Attacks on AI Models: Prompt Injection vs. Supply Chain Poisoning

Comparison of prompt injection & supply chain poisoning attacks on AI models, with a focus on a bank assistant. Prompt injection has a limited impact on individual sessions, while supply chain poisoning affects the entire supply chain, posing severe risks.

Daniel Huynh
Members Public

Open Source is crucial for AI transparency but needs more tooling

AI model traceability is crucial, but open-source practices alone are inadequate. Combining new software and hardware-based tools with open sourcing offers potential solutions for a secure AI supply chain.

Daniel Huynh
Members Public

The AI Act: 9 key answers to get onboard

On the 14th of June, the AI Act was successfully passed by the EU parliament. We gathered information on this complex piece of legislation for you. Let’s break down how the EU wants to regulate Artificial Intelligence with 10 questions.

Raphaël Millet
Members Public

Mithril x Tramscribe: Confidential LLMs for medical voice notes analysis

How we partnered with Tramscribe to leverage LLMs deal with Medical voice notes analysis

Corentin Lauverjat
Members Public

Identifying a critical attestation bypass vulnerability in Apache Teaclave

This vulnerability can be used to mount a Man in the Middle attack. We found a fix that Teaclave implemented following the release of this article.

Raphaël Millet
Members Public

Mithril x Avian: Zero Trust Digital Forensics and eDiscovery

How we partnered with Avian to deploy sensitive Forensic services thanks to Zero Trust Elastic search.

Charles Chudant
Members Public

Jupyter Notebooks Are Not Made for Sensitive Data Science Collaboration

When collaborating remotely on sensitive data, their usually amazing interactivity and flexibility need safeguards, or whole datasets can be extracted in a few lines of code.

Daniel Huynh
Members Public

Mithril Security joins the Confidential Computing Consortium

Mithril Security joins the Confidential Computing Consortium to accelerate open-source privacy friendly AI

Daniel Huynh
Members Public

Confidential computing explained. Part 3: data in use protection

Deep dive into the data-in-use protection mechanisms of secure enclaves