Key Building Blocks to Advance American Leadership in AI

The AI era is set to be a time of significant change for technological and information security.
To guide the development and deployment of AI tools in a way that embraces their benefits while safeguarding against potential risks, the US government has outlined a set of voluntary commitments they are asking companies to make.
Develop tools to identify if content is AI-generated and prioritize research on ways AI could be harmful at a societal level to mitigate those harms.
Responsible AI development and deployment will require close work between industry leaders and the government.
To advance that goal, Google, along with several other organizations, partnered to host a forum in October to discuss AI and security.
As part of the October AI security forum, we discussed a new Google report focused on AI in the US public sector: Building a Secure Foundation for American Leadership in AI. This whitepaper highlights how Google has already worked with government organizations to improve outcomes, accessibility, and efficiency.
The report advocates for a holistic approach to security and explains the opportunities a secure AI foundation will provide to the public sector.
The Potential of Secure AI Security can often feel like a race, as technology providers need to consider the risks and vulnerabilities of new developments before attacks occur.
Since we are still early in the era of public availability of AI tools, organizations can establish safeguards and defenses before AI-enhanced threats become widespread. However, that window of opportunity won't last forever.
The potential use of AI to power social engineering attacks and to create manipulated images and video for malicious purposes is a threat that will only become more pressing as technology advances, which is why AI developers must prioritize the trust tools outlined as part of the White House's voluntary commitments.
AI is already transforming how people learn and build new skills, and the responsible use of AI tools in both the public and private sectors can significantly improve worker efficiency and the outcomes for the end user.
Google has been working with US government agencies and related organizations to securely deploy AI in ways that advance key national priorities.
Three Key Building Blocks for Secure AI At the October AI forum, Google presented three key organizational building blocks to maximize the benefits of AI tools in the US. First, it's essential to understand how threat actors currently use AI capabilities and how those uses are likely to evolve.
Second, organizations should deploy secure AI systems.
This can be achieved by following guidelines such as the White House's recommendations and Google's Secure AI Framework.
The SAIF includes six core elements, including deploying automated security measures and creating faster feedback loops for AI development.
Finally, security leaders should take advantage of all the ways AI can help enhance and supercharge security.
AI technologies can simplify security tools and controls while also making them faster and more effective, all of which will help defend against the potential increase in adversarial attacks AI systems may enable.
These three building blocks can form the basis for the secure, effective implementation of AI technologies across American society.
By encouraging AI development leaders and government officials to keep working together, we will all benefit from the enhancements that safe and trustworthy AI systems will bring to the public and private sectors.


This Cyber News was published on www.darkreading.com. Publication date: Wed, 20 Dec 2023 12:55:05 +0000


Cyber News related to Key Building Blocks to Advance American Leadership in AI

How Empathetic Leadership Can Shape the Future of Inclusion in Cybersecurity - Enter empathetic leadership - a style of management that prioritises understanding, compassion, and inclusivity. In this article, we explore how empathetic leadership can shape the future of inclusion in cybersecurity. Empathetic leadership is a ...
5 months ago Cyberdefensemagazine.com
Key Building Blocks to Advance American Leadership in AI - The AI era is set to be a time of significant change for technological and information security. To guide the development and deployment of AI tools in a way that embraces their benefits while safeguarding against potential risks, the US government ...
10 months ago Darkreading.com
$25M gone in 12 seconds! Brothers accused of Ethereum heist The Register - These transactions are grouped onto blocks that are chained together, hence the name. As the name suggests, validator bots attest that proposed blocks of Ethereum transactions are valid and send those blocks to a committee of fellow validators to ...
5 months ago Go.theregister.com
American Family Insurance confirms cyberattack is behind IT outages - Insurance giant American Family Insurance has confirmed it suffered a cyberattack and shut down portions of its IT systems after customers reported website outages all week. American Family Insurance is an insurance company focusing on commercial and ...
11 months ago Bleepingcomputer.com
Customer compliance and security during the post-quantum cryptographic migration | AWS Security Blog - For example, using the s2n-tls client built with AWS-LC (which supports the quantum-resistant KEMs), you could try connecting to a Secrets Manager endpoint by using a post-quantum TLS policy (for example, PQ-TLS-1-2-2023-12-15) and observe the PQ ...
1 month ago Aws.amazon.com
Product showcase: Protect digital identities with Swissbit's iShield Key Pro - In today's fast-paced business world, protecting digital identities and optimizing daily workflows are crucial. The iShield Key Pro series from Swissbit addresses these challenges by offering top-notch security combined with effortless usability. ...
4 months ago Helpnetsecurity.com
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
1 month ago Securelist.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
1 month ago Cyberdefensemagazine.com
First American says funds secure despite cyberattack - Title insurance company First American said all funds held at First American Trust and third-party partner banks remain secure despite a cyberattack affecting the company's operations since last week. The real estate industry giant provided several ...
10 months ago Therecord.media
Cisco and Schneider Electric Are Creating Smarter, More Efficient Buildings - Whether your organization owns commercial property, leases it, or manages it, you're likely to be grappling with industry trends and challenges that call on your best efforts-and the innovative application of technology. The need to reduce energy ...
9 months ago Feedpress.me
First American becomes latest real estate industry giant hit with cyberattack - Title insurance company First American confirmed Thursday that it is dealing with a cyberattack. First American provides title insurance and settlement services for real estate companies and mortgage providers. It reported revenues of $7.6 billion in ...
10 months ago Therecord.media
Behind EB Control's Revolutionary Patented Key Management System - If you're knee-deep in the world of data security, you'd agree that the key to unlocking superior protection lies, quite literally, in the keys- the encryption keys, to be precise. When it comes to managing these critical elements to safeguard your ...
11 months ago Securityboulevard.com
Bitwarden: how to create and use Passkeys to sign in - They can use a master password and improve security by adding a two-factor authentication option to the process. A private part of it never leaves the device, which means that all standard password attacks don't work against passkeys. I used the ...
9 months ago Ghacks.net
ONCD Welcomes Mr. Harry Coker, Jr. as Next National Cyber Director - Once sworn in, Mr. Coker will be the second National Cyber Director in the Office, which was established in 2021 as part of the National Defense Authorization Act. The National Cyber Director serves as principal advisor to the President on ...
10 months ago Darkreading.com
Cyberattack Disrupts Operations of First American, Subsidiaries - The systems and operations of First American Financial Corporation and several of its subsidiaries appear to have been significantly disrupted by a cyberattack. First American provides title insurance and settlement services to the real estate and ...
10 months ago Securityweek.com
Cyberattack Disrupts Operations of First American, Subsidiaries - The systems and operations of First American Financial Corporation and several of its subsidiaries appear to have been significantly disrupted by a cyberattack. First American provides title insurance and settlement services to the real estate and ...
10 months ago Packetstormsecurity.com
Safeguard Your Network in a Post-Quantum World - There is an imminent threat to existing cryptography with the advent of quantum computers. A quantum computer works with qubits, which can exist in multiple states simultaneously, based on the quantum mechanical principle of superposition. Thus, a ...
9 months ago Feedpress.me
Book Review: "Premier CISO - Board & C-Suite" By Michael S. Oberlaender - Home - Future, Trends and Insight - Book Review - Book Review: “Premier CISO – Board & C-Suite” by Michael S. Overall, “Premier CISO – Board & C-Suite” is a valuable resource for cybersecurity professionals ...
1 month ago Informationsecuritybuzz.com
CVE-2022-20866 - A vulnerability in the handling of RSA keys on devices running Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to retrieve an RSA private key. This ...
2 years ago
How to Use Titan Security Keys With Passkey Support - Google's updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords. Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys ...
10 months ago Techrepublic.com
So You Want to be a Leader in Cybersecurity? Follow this Path - Effective cybersecurity leadership is vital for organizations worldwide. Cybersecurity leaders embed security across operations, rapidly respond to threats and advise senior leaders. They stay in front of cybersecurity trends from a technical ...
10 months ago Cybersecurity-insiders.com
Zeus, IcedID malware gangs leader pleads guilty, faces 40 years in prison - Ukrainian national Vyacheslav Igorevich Penchukov, one of the heads of the notorious JabberZeus cybercrime gang, has pleaded guilty to charges related to his leadership roles in the Zeus and IcedID malware groups. Penchukov was arrested in ...
8 months ago Bleepingcomputer.com
​​Strengthening identity protection in the face of highly sophisticated attacks​​ - We continuously work to improve the built-in security of our products and platforms. It's a multi-year commitment to advance the way we design, build, test, and operate our technology to ensure we deliver solutions that meet the highest possible ...
10 months ago Techcommunity.microsoft.com
OT Cybersecurity: Safeguarding Building Operations in a Digitized World - These concerns are brought into the spotlight by high-profile ransomware attacks, which can now penetrate even the most intricate systems. Recently, in September, the gravity of this threat was illustrated when two Las Vegas casinos fell victim to an ...
9 months ago Cyberdefensemagazine.com
Fortifying the Human Firewall: Six-Steps For An Effective Security Awareness Program - Cybersecurity technology has come a long way too; however, security researchers are increasingly finding that most breaches are related to human factors such as phishing, which stem from poor security judgment and careless employee attitudes and not ...
11 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)