GenAI development should follow secure-by-design principles

Given how dangerous the gold rush was and how long it took to incorporate safety measures, the time is now for organizations using GenAI to follow secure-by-design principles and follow CISA's example.
Beyond writing faux movie scripts and passing school exams, GenAI is projected to generate as much as $4.4 trillion annually into the global economy.
The hype surrounding its potential is real, but it has also created a problematic environment where go-to-market timelines and cost efficiency seemingly precede safety and security.
A Fastly research report found more than two-thirds of IT decision-makers believe GenAI will open new attack avenues, while nearly half are concerned about their inability to defend against AI-enabled threats.
Nation-state adversaries could use GenAI to target U.S. critical infrastructure sites, such as electric grids, water treatment plants and healthcare facilities, putting lives at risk.
We're in a race against the clock to put stronger parameters in place that facilitate secure AI systems and foster a safer future.
Facilitate the adoption of secure-by-design principles to drive safe AI software development and implementation across the public and private sectors.
Coordinate with international partners to advance global AI security best practices, and ideate effective policy approaches for the U.S. government's national AI strategy.
There isn't a straightforward solution to executing them at scale, but it starts by ensuring AI system developers weigh security objectives and business objectives as equal.
The security challenges associated with AI parallel cybersecurity challenges associated with previous generations of software that manufacturers did not build to be secure by design, putting the burden of security on the customer.
Although AI software systems might differ from traditional forms of software, fundamental security practices still apply.
As the use of AI grows and becomes increasingly incorporated into critical systems, security must be a core requirement and integral to AI system development from the outset and throughout its lifecycle.
Implemented during the early stages of product development, secure-by-design principles help reduce an application's exploit surface before it is made available for broad use - promoting the security of the customer as a core business requirement rather than a technical feature.
The larger challenge is that, in addition to assuring AI systems, we also must protect everything AI is capable of touching - critical infrastructure and private networks alike.
Secure by design must be implemented through the lens of AI alignment, ensuring systems are built to uphold fundamental human values and ethical boundaries.
Beyond danger to human life, failing to prioritize safe and secure AI systems could have legal consequences for AI system developers.
We're seeing a similar trend across cybersecurity amid new federal regulations, with the Security and Exchange Commission recently issuing fraud charges against SolarWinds and its CISO for allegedly concealing cyber-risk from investors and customers.
The rise of GenAI in 2023 showed how much can change in a year.
While we can't predict where the AI era is headed, a steadfast commitment to facilitating safe and secure systems is paramount to navigating it safely.
By following CISA's roadmap and blending secure by design with AI alignment throughout the development lifecycle, we can take proactive steps to ensure AI remains a force for good.


This Cyber News was published on www.techtarget.com. Publication date: Fri, 02 Feb 2024 20:43:05 +0000


Cyber News related to GenAI development should follow secure-by-design principles

Aim Security Raises $10M to Secure Generative AI Enterprise Adoption - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)-Aim Security, an Israeli cybersecurity startup offering enterprises a holistic, one-stop shop GenAI security platform, today announced $10 million in seed funding. Aim Security was founded by ...
5 months ago Darkreading.com
GenAI development should follow secure-by-design principles - Given how dangerous the gold rush was and how long it took to incorporate safety measures, the time is now for organizations using GenAI to follow secure-by-design principles and follow CISA's example. Beyond writing faux movie scripts and passing ...
5 months ago Techtarget.com
Flow Security Launches GenAI DLP - PRESS RELEASE. TEL AVIV, Israel, Nov. 30, 2023 /PRNewswire/ - Flow Security, the pioneering Data Security Lifecycle Platform, announced today its extension to GenAI Security with the launch of a new GenAI DLP module. This move makes Flow Security the ...
7 months ago Darkreading.com
GenAI Regulation: Why It Isn't One Size Fits All - With President Biden calling on Congress to pass bipartisan data privacy legislation to accelerate the development and use of privacy-centric techniques for the data that is training AI, it's important to remember that excessive regulation can stifle ...
3 months ago Cybersecurity-insiders.com
Akto Launches Proactive GenAI Security Testing Solution - With the increasing reliance on GenAI models and Language Learning Models like ChatGPT, the need for robust security measures have become paramount. Akto, a leading API Security company, is proud to announce the launch of its revolutionary GenAI ...
4 months ago Darkreading.com
Cybersecurity for Art and Design Schools - In the digital age, art and design schools face unique cybersecurity challenges. This article aims to shed light on the importance of cybersecurity in art and design schools and provide insights into safeguarding digital portfolios and ensuring ...
5 months ago Securityzap.com
AI Market Research: The Pivotal Role of Generative AI in Cyber Security - What researchers are learning about GenAI and cyber security. Pair AI with cyber security and the possibilities are staggering. For many security professionals, it's a foregone conclusion that incorporating intelligence into cyber security will ...
1 month ago Blog.checkpoint.com
'Secure by design' makes waves at RSA Conference 2024 - Secure by design refers to the principle that software should be developed with security in mind through established development frameworks and best practices. Though the concept is far from new, the approach has been featured in multiple different ...
1 month ago Techtarget.com
How Secure Cloud Development Replaces Virtual Desktop Infrastructures - The need to secure corporate IT environments is common to all functions of organizations, and software application development is one of them. Development environments have notoriously complex setups and often require significant maintenance because ...
3 months ago Feeds.dzone.com
Cisco Motific reduces GenAI security, trust, and compliance risks - Cisco announced Motific, Cisco's SaaS product that allows for trustworthy GenAI deployments in organizations. Born from Outshift, Cisco's incubation business, Motific provides a central view across the entire GenAI journey, empowering central IT and ...
4 months ago Helpnetsecurity.com
Singapore seeks expanded governance framework for generative AI - Singapore has released a draft governance framework on generative artificial intelligence that it says is necessary to address emerging issues, including incident reporting and content provenance. The proposed model builds on the country's existing ...
5 months ago Zdnet.com
10 Major Benefits of Cloud-Native Application Development - Cloud-native application development combines organizational and technical changes in the design, build, and deployment of software in the cloud to deliver value faster and improve overall business efficiency. UST experts reimagine cloud strategy, ...
4 months ago Esecurityplanet.com
11 GenAI cybersecurity surveys you should read - Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. As the integration of these technologies continues, a vigilant approach to ethical considerations and ...
6 months ago Helpnetsecurity.com
Understanding zero-trust design philosophy and principles - In this Help Net Security interview, Phil Vachon, Head of Infrastructure in the Office of the CTO at Bloomberg, discusses the varying definitions of zero trust among security professionals and companies, emphasizing its broad design philosophy. ...
5 months ago Helpnetsecurity.com
Legal, compliance and privacy leaders anxious about rapid GenAI adoption - Rapid GenAI adoption is the top-ranked issue for the next two years for legal, compliance and privacy leaders, according to Gartner. 70% of respondents reported rapid GenAI adoption as a top concern for them. Gartner experts have identified four key ...
6 months ago Helpnetsecurity.com
CISOs Reconsider Their Roles in Response to GenAI Integration - Chief information security officers face mounting pressure as cyberattacks surge and complexities surrounding the implementation of GenAI and AI technologies emerge. The vast majority - 92% - of the 500 CISOs surveyed by Trellix admitted they are ...
1 month ago Securityboulevard.com
12 Software Dev Predictions for Future - Predicting the future of software development trends is always a tough call. Such trends will also rule the future of the software development industry. Analyzing these future software development trends will put enthusiasts ahead of the competition. ...
5 months ago Feeds.dzone.com
CISA Issues Request For Information on Secure by Design Software Whitepaper - WASHINGTON - Today, the Cybersecurity and Infrastructure Security Agency published a Request for Information from all interested parties on secure by design software practices, including the Shifting the Balance of Cybersecurity Risk: Principles and ...
6 months ago Cisa.gov
DevSecOps: Definition, Benefits and Best Practices - DevSecOps is an approach that focuses on the alignment of the three core pillars of DevOps — Development, Operations, and Security. It’s a combination of processes, tools and practices designed to enable organizations to adopt innovative and ...
1 year ago Heimdalsecurity.com
Businesses gain upper hand with GenAI integration - Firms that actively harness generative AI to enhance experiences, offerings, and productivity will realize outsized growth and will outpace their competition, according to Forrester. Between July and September 2023, the number of enterprises that are ...
6 months ago Helpnetsecurity.com
ASD's ACSC, CISA, and Partners Release Secure by Design Guidance on Choosing Secure and Verifiable Technologies - This guidance was crafted to provide organizations with secure by design considerations when procuring digital products and services. The guidance contains a range of internal and external considerations and offers sample questions to leverage at ...
1 month ago Cisa.gov
The Role of DevOps in Enhancing the Software Development Life Cycle - Software development is a complex and dynamic field requiring constant input, iteration, and collaboration. DevOps is more than just a methodology; it combines practices seamlessly integrating software development and IT operations for streamlining ...
5 months ago Feeds.dzone.com
CIOs shape long-term success with GenAI expertise - Today's CIOs have evolved from managing IT infrastructure and ensuring systems' efficiency to becoming key business strategists, according to IDC. They stand at the intersection of technology and business, leveraging innovations to shape ...
6 months ago Helpnetsecurity.com
The Crucial Need for a Secure Software Development Lifecycle in Today's Digital Landscape - In today's increasingly digital world, software is the backbone of business operations, from customer-facing applications to internal processes. The rapid growth of software development has also made organizations more vulnerable to security threats. ...
5 months ago Cyberdefensemagazine.com
Forget Deepfakes or Phishing: Prompt Injection is GenAI's Biggest Problem - Cybersecurity professionals and technology innovators need to be thinking less about the threats from GenAI and more about the threats to GenAI from attackers who know how to pick apart the design weaknesses and flaws in these systems. Chief among ...
5 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)