PAC considers that multi-hop AI represents a paradigm shift in artificial intelligence deployment. However, the distributed nature of multi-hop AI pipelines creates an expanded attack surface, necessitating robust security measures to ensure reliable and trustworthy operation.
Contents:
Management Summary
Contextualising the Security Risks of a Multi-hop AI
Understanding the Challenges of Securing Multi-hop AI
PAC’s Recommendations
SHARE :
This document provides market volumes, growth rates and forecasts for the AI market in Luxembourg for the 2021-2027 period.
Event Date : February 07, 2023
Dutch banking IT investment is accelerating, driven by regulatory compliance, cybersecurity, cloud adoption, and fintech competition. Banks ...
Event Date : December 22, 2025
This document provides the following vendor rankings for the SAP services market in APAC: SAP Consulting & System Integration ...
Event Date : December 15, 2025
This Excel document is part of the company profiles PAC publishes every year at local, regional and worldwide level.
Event Date : January 16, 2026
This document provides market volumes, growth rates and forecasts for the AI market in India for the 2021-2027 period.
Event Date : February 08, 2023
Vertical Sectors - Market Figures - Spain
Datamart January 20, 2026
Software & IT Services - Market Figures - Spain
Datamart January 20, 2026
Vertical Sectors - Market Figures - Italy
Datamart January 20, 2026
Software & IT Services - Market Figures - Italy
Datamart January 20, 2026
Software & IT Services - Market Figures - Sweden
Datamart January 20, 2026
Atos: Cause for Optimism, Despite the Headlines
Blog Post February 05, 2024
Part 8: The Future of Infrastructure Security: What's Next After Integration?
Blog Post January 20, 2026
Part 7: Bringing It All Together: Developing a Unified Infrastructure Security Strategy
Blog Post January 12, 2026
What PAC Expects At Mobile World Congress 2026
Blog Post January 12, 2026
Part 6: Cloud Security: Shared Responsibility and Real Accountability
Blog Post January 09, 2026
Part 5: Data Center Security: Where Bits Meet Bricks
Blog Post January 08, 2026