Responsibly Implementing AI, the Unstoppable Force

The Good News About AI People are using generative AI to see information in a more conversational way.
Generative AI tools can listen and respond to voice input, a popular alternative to typing text into a search engine.
In some forward-thinking organizations, it's even being applied to automate and innovate everyday tasks, like internal help desks.
It's important to remember that many of the most important and exciting use cases are not actually coming from generative AI. Advanced AI/ML models are helping solve some of the biggest problems facing humanity - things like developing new drugs and vaccines.
Enabling customers in the healthcare, medical, and life sciences fields to securely implement AI means helping them solve those big problems.
We have nearly 100 data scientists working on AI/ML algorithms every day, and we have released more than 50 models in support of stopping threats and preventing exfiltration of sensitive data from insiders or attackers who have infected insiders.
Security problems that were intractable are now solvable using AI/ML. For example, attackers have been stealing sensitive data in innovative ways, lifting secrets from virtual whiteboards or concealing data in images by emailing images embedded with sensitive information to evade common security tools.
An attacker could access an exposed repository with credit card images that are hazy or have a glare that traditional security may not recognize, but advanced ML capabilities could help catch.
These kinds of sophisticated attacks, enabled using AI/ML, also cannot be stopped without the use of AI/ML. The Bad News About AI Every technology can be used for good or for bad. Cloud today is both the biggest enabler of productivity and the most frequently employed delivery mechanism for malware.
Hackers are already using generative AI to enhance their attack capabilities - developing phishing emails or writing and automating malware campaigns.
Attackers don't have much to lose nor to worry about how precise or accurate the results are.
If attackers have AI/ML in their arsenal and you don't, good luck.
You need tools, processes, and architectures to protect yourself.
Balancing the good and bad of AI/ML means being able to control what data you're feeding into AI systems and solving the privacy issues to securely enable generative AI. We are at an important crossroads.
While its intention is to give guidance to federal agencies on AI systems testing and usage, the order will have ample applicability to private industry.
As an industry, we must not be afraid to implement AI and must do everything possible to thwart bad actors from applying AI to harm industry or national security.
Some applications will require high precision and accuracy as well as access to sensitive data, but others will not.
Generative AI hallucinations in a medical research context would deter its usage.
Error rates in more benign applications may be OK. Classifying how you're using AI can help you target the low-hanging fruit - the applications that aren't as sensitive to the tools' limitations.
To responsibly achieve any of those aspirational outcomes from generative AI or broader AI/ML models, organizations must first ensure they can protect their people and data from the risks inherent to these powerful tools.


This Cyber News was published on www.darkreading.com. Publication date: Mon, 11 Dec 2023 15:00:06 +0000


Cyber News related to Responsibly Implementing AI, the Unstoppable Force

Zero Trust Security Framework: Implementing Trust in Business - The Zero Trust security framework is an effective approach to enhancing security by challenging traditional notions of trust. Zero Trust Security represents a significant shift in the cybersecurity approach, challenging the conventional concept of ...
1 year ago Securityzap.com
Responsibly Implementing AI, the Unstoppable Force - The Good News About AI People are using generative AI to see information in a more conversational way. Generative AI tools can listen and respond to voice input, a popular alternative to typing text into a search engine. In some forward-thinking ...
1 year ago Darkreading.com
Building a Culture of Digital Responsibility in Schools - In today's technologically-driven world, schools have a critical role in cultivating a culture of digital responsibility among students. Promoting digital responsibility involves educating students about the potential risks and consequences ...
1 year ago Securityzap.com
Online Learning Security Best Practices - The rapid increase in remote learning has raised security concerns surrounding online learning platforms. The security of online learning platforms involves implementing robust measures to protect against unauthorized access and data breaches. By ...
1 year ago Securityzap.com
Known, emerging unstoppable ransomware attacks still evade defenses - Ransomware attacks continue to evolve, with both known and emerging variants proving unstoppable and evading current cybersecurity defenses. Despite advances in detection and prevention technologies, threat actors are leveraging sophisticated ...
2 months ago Bleepingcomputer.com CVE-2023-23397 CVE-2023-28252 LockBit BlackCat Hive
Biometric Security in Educational Environments - Biometric technology has gained significant attention in recent years as a potential solution to enhance security in educational environments. The adoption of biometric security in educational settings raises important privacy and ethical concerns. ...
1 year ago Securityzap.com
'Defunct' DOJ ransomware task force raises questions, concerns | TechTarget - "The Office of the Deputy Attorney General (ODAG) memorandum that established the Ransomware Task Force also contained several strategic areas, including directing the Ransomware Task Force to design and implement a strategy to disrupt and dismantle ...
1 year ago Techtarget.com LockBit
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
1 year ago Securityzap.com
WordPress Security Research: A Beginner's Series - Over the coming months, this series will be presented through multiple blog posts, each delving into the fundamentals of WordPress's architecture and security mechanisms while featuring real-world examples of vulnerabilities and their exploitation. ...
1 year ago Wordfence.com
What Is a Brute Force Attack? - A brute force attack is a type of cyber-attack that criminals use, in order to gain access to a computer system or the private data stored within. This type of attack involves a hacker attempting to guess information, such as passwords or access ...
2 years ago Heimdalsecurity.com
The old, not the new: Basic security issues still biggest threat to enterprises - Attacks on critical infrastructure reveal industry faux pas. Ransomware attacks on enterprises saw a nearly 12% drop last year, as larger organizations opt against paying and decrypting, in favor of rebuilding their infrastructure. X-Force analysis ...
1 year ago Helpnetsecurity.com
Securing Student Data in Cloud Services - In today's educational landscape, securing student data in cloud services is of utmost importance. One key aspect of securing student data in cloud services is ensuring proper data encryption. This article explores the various challenges and best ...
1 year ago Securityzap.com
Cybersecurity for Homeschooling Parents: A Guide - With the increased reliance on technology and online tools, homeschooling parents must also address the pressing issue of cybersecurity. Whether it's securing tech tools, teaching safe online practices, or accessing valuable resources, this guide ...
1 year ago Securityzap.com
Biometric Authentication in Business: Enhancing Security - With its high level of security, convenience, user-friendliness, and accuracy, biometric authentication is paving the way for the future of secure authentication in the business world. One of the primary advantages of implementing biometric ...
1 year ago Securityzap.com
From Trend to Mainstay: The Unstoppable Force of Managed Services - There's no denying that IT managed services are being embraced across businesses of all sizes as a path to achieve business goals. As technologies becomes increasingly complex and the lines between siloed architectures become blurred, companies are ...
1 year ago Feedpress.me
How To Implementing MITRE ATT&CK In SOC Workflows - A Step-by-Step Guide - By understanding the framework, mapping your current capabilities, developing targeted detection and response strategies, and integrating ATT&CK into your tools and processes, you can build a proactive, threat-informed defense that evolves ...
7 months ago Cybersecuritynews.com
CISA Announces Renewal of the Information and Communications Technology Supply Chain Risk Management Task Force - The Task Force, chaired by CISA's National Risk Management Center and the Information Technology and Communications Sector Coordinating Councils, is a public-private partnership composed of a diverse range of representatives from public and private ...
1 year ago Cisa.gov
Critical WordPress Plugin Vulnerability Exposes 200k Websites to Site Takeover Attack - The vulnerability, assigned CVE-2025-6691 with a CVSS score of 8.8, allows unauthenticated attackers to delete arbitrary files on affected servers, including the crucial wp-config.php file that controls WordPress database connections. The SureForms ...
4 months ago Cybersecuritynews.com CVE-2025-6691
Investigator Gains Unauthorized Access to Toyota Supplier Database Containing Data on 14000 Associates - Toyota's Global Supplier Preparation Information Management System (GSPIMS) was recently breached by a security researcher who responsibly reported the issue to the company. GSPIMS is a web application that allows employees and suppliers to remotely ...
2 years ago Bleepingcomputer.com
Android game dev's Google Drive misconfig highlights cloud security risks - Japanese game developer Ateam has proven that a simple Google Drive configuration mistake can result in the potential but unlikely exposure of sensitive information for nearly one million people over a period of six years and eight months. The ...
1 year ago Bleepingcomputer.com
CISA Has a New Road Map for Handling Weaponized AI - Last month, a 120-page United States executive order laid out the Biden administration's plans to oversee companies that develop artificial intelligence technologies and directives for how the federal government should expand its adoption of AI. At ...
2 years ago Wired.com
Cloud-ready and Channel-first - For over 30 years, we've worked hand in hand with the channel to make the digital world a safer place. So we're delighted to receive more recognition of the value we're adding for partners and customers with the release of the latest CRN Cloud 100 ...
2 years ago Trendmicro.com
Multimillion-dollar cryptojacker snared by Ukrainian police The Register - The criminal thought to be behind a multimillion-dollar cryptojacking scheme is in custody following a Europol-led investigation. Supported by the National Police of Ukraine, Europol arrested a 29-year-old, whose identity is being withheld, this week ...
1 year ago Go.theregister.com TeamTNT
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
1 year ago Securityzap.com
How To Prioritize Threat Intelligence Alerts In A High-Volume SOC - This article explores practical strategies and frameworks for prioritizing threat intelligence alerts in high-volume SOC environments, helping security teams focus on what matters most while reducing alert fatigue and improving overall security ...
7 months ago Cybersecuritynews.com