May 31, 2024
The research underscores that the rush to integrate AI into business processes does pose risks, especially for companies that are giving LLMs and other generative-AI applications access to large repositories of data. ... The risks posed by the adoption of next-gen artificial intelligence and machine learning (AI/ML) are not necessarily due to the models, which tend to have smaller attack surfaces, but the software components and tools for developing AI applications and interfaces, says Dan McInerney, lead AI threat researcher with Protect AI, an AI application security firm. "There's not a lot of magical incantations that you can send to an LLM and have it spit out passwords and sensitive info," he says. "But there's a lot of vulnerabilities in the servers that are used to host LLMs. The [LLM] is really not where you're going to get hacked — you're going to get hacked from all the tools you use around the LLM." ... "Exploitation of this vulnerability could affect the immediate functioning of the model and can have long-lasting effects on its credibility and the security of the systems that rely on it," Synopsys stated in its advisory.
Referring to the classical MITRE framework, the recommendation is to “shift right” – moving focus towards recovery. After thoroughly assessing risks and implementing various tools, it’s crucial to have a solid recovery plan in place. Customers are increasingly concerned about scenarios where both their primary and disaster recovery (DR) systems are compromised by ransomware, and their backups are unavailable. According to a Microsoft report, in 98% of successful ransomware cases, backups are disabled. To address this concern, the strategy involves building a cyber resilient framework that prioritises recovery. ... For us, AI serves multiple purposes, primarily enhancing efficiency, scanning for threats, and addressing customer training and enablement needs. From a security perspective, we leverage AI extensively to detect ransomware-related risks. Its rapid data processing capabilities allow for thorough scanning across vast datasets, enabling pattern matching and identifying changes indicative of potential threats. We’ve integrated AI into our threat scanning solutions, strengthening our ability to detect and mitigate malware by leveraging comprehensive malware databases.
Developing second-line leaders helps your business unit or function succeed at a whole new level: When your teams know that leadership development is a priority, they start preparing for future roles. The top talent will cultivate their skills and equip themselves for leadership positions, enhancing overall team performance. As the cascading effect builds, this proactive development has a multiplicative impact, especially if competition within the team remains healthy. It's also important for your personal growth as a leader: The most fulfilling aspect is the impact on yourself. Measuring your leadership success by contribution, attribution, and legacy, developing capable successors fulfils all three criteria. It ensures you contribute effectively, gain recognition for building strong teams, and leave a lasting legacy through the leaders you've developed. ... It starts with the self. Begin with delegation without abdication or evasion of accountability. This skill is a cornerstone of effective leadership, involving the entrusting of responsibilities to others while empowering them to assume ownership and make informed decisions.
Recommended by LinkedIn
Effective trust management requires specific approaches, such as robust monitoring systems, rigorous auditing processes and well-defined incident response plans. More importantly, in order for any initiative to address AI risks to be successful, we as an industry need to build a workforce of trained professionals. Those operating in the digital trust domain, including cybersecurity, privacy, assurance, risk and governance of digital technology, need to understand AI before building controls around it. The ISACA AI survey revealed that 85% of digital trust professionals say they will need to increase their AI skills and knowledge within two years to advance or retain their jobs. This highlights the importance of continuous learning and adaptation for cybersecurity professionals in the era of AI. Gaining a deeper understanding of how AI-powered attacks are altering the threat landscape, along with how AI can be effectively utilized by security practitioners, will be essential. As security professionals learn more about AI, they need to ensure that the methods being deployed align with an enterprise’s overarching need to maintain trust with its stakeholders.
A strong security posture requires granular visibility into 5G traffic and automated security enforcement to effectively thwart attackers, protect critical services, and safeguard against potential threats to assets and the environment. This includes a focus on detecting and preventing attacks at all layers, interface and threat vector — from equipment (PEI) and subscriber (SUPI) identification, applications, signaling, data, network slices, malware, ransomware and more. ... To accomplish the task at hand brought about by 5G, CISOs must be prepared to provide a swift response to known and unknown threats in real time with advanced AI and machine learning, automation and orchestration tools. As connotation shifts from viewing 4G as a more consumer-focused mobile network to the power of private 5G when embedded across enterprise infrastructure, any kind of lateral network movement can bring about damage. ... Strategy and solution start with zero trust and can go as far as an entire 5G SOC dedicated to the nuances brought about by the next-gen network. The change and progress 5G promises is only as significant as our ability to protect networks and infrastructure from malicious actors, threats, and attacks.
CASBs sit between an organization’s endpoints and cloud resources, acting as a gateway that monitors everything that goes in or out, providing visibility into what users are doing in the cloud, enforcing access control policies, and looking out for security threats. ... The original use case for CASBs was to address shadow IT. When security execs deployed their first CASB tools, they were surprised to discover how many employees had their own personal cloud storage accounts, where they squirreled away corporate data. CASB tools can help security teams discover and monitor unauthorized or unmanaged cloud services being used by employees. ... Buying a CASB tool can be complex. There’s a laundry list of possible features that fall within the broad CASB definition (DLP, SWG, etc.) And CASB tools themselves are part of a larger trend toward SSE and SASE platforms that include features such as ZTNA or SD-WAN. Enterprises need to identify their specific pain points — whether that’s regulatory compliance or shadow IT — and select a vendor that meets their immediate needs and can also grow with the enterprise over time.