Startups Scramble to Build Immediate AI Security

It also elevated startups working on machine learning security operations, AppSec remediation, and adding privacy to AI with fully homomorphic encryption.
AI's largest attack surface involves its foundational models, such as Meta's Llama, or those produced by giants like Nvidia, OpenAI, Microsoft, etc.
The overwhelming majority of today's machine learning development involves reusing these foundational models.
At least at the moment, building bespoke models from scratch has proven too expensive.
Instead, engineers tune foundational models, train them on additional data, and blend these models into traditional software development.
Foundational models have all the existing vulnerabilities of the software supply chain, plus AI's new mathematical threats.
One can change even a single pixel in an image and induce different model outputs.
Despite patching, there will always be ways to change inputs to attack foundational models.
It's not easy to patch all the known vulnerabilities in a model.
Thousands of academic papers describe adversarial AI attacks on deployed production models, as does the MITRE Atlas framework.
Adversarial AI wielded against models in production environments has caught the public's attention.
Consider that potential victims may throttle model queries so low that there aren't enough interactions for the attacks in MITRE Atlas to even work.
It secures bespoke model development, training data, and analyze foundational models for vulnerabilities.
A further debate is driven by Adversa AI and Calypso AI, which are both skeptical that foundational models can ever be secured.
Adversa AI automates foundational model pen testing and validation, along with red-team services.
Calypso AI focuses on scoring vulnerabilities at the point of model prompts and their responses, either logging or blocking.
Startups Got Realistic About Fully Homomorphic Encryption FHE is quite different than the all-or-nothing encryption of old.
While still encrypted, FHE can be productively used by many ML algorithms, neural networks, and even large language models.
Two smaller FHE startups also received strategic investments in 2023.
Only a small number of innovators at early growth startups have coherent visions of AI security.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 02 Jan 2024 15:05:25 +0000


Cyber News related to Startups Scramble to Build Immediate AI Security

How the Evolving Role of the CISO Impacts Cybersecurity Startups - It helps startups striving to meet the ever-evolving needs of CISOs, who are simultaneously seeking the elusive but paramount buy-in from business users and executives. The CISO role has evolved dramatically in the past few years in response to ...
7 months ago Darkreading.com
CVE-2024-26626 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
When Looking For Cybersecurity Solutions, Don't Shrug Off Startups - Let's say you're looking for some new technology for your business. That's why it's time to start giving startup tech a fair shake. It's nice to stick with a known commodity, especially when you're talking about securing your company's digital ...
6 months ago Cybersecurity-insiders.com
Startups Scramble to Build Immediate AI Security - It also elevated startups working on machine learning security operations, AppSec remediation, and adding privacy to AI with fully homomorphic encryption. AI's largest attack surface involves its foundational models, such as Meta's Llama, or those ...
6 months ago Darkreading.com
AI, Supply Chain Are Fertile Areas for Cybersecurity Investment - The past year has been a busy one for startups, with investors re-evaluating their rules on what kind of companies to invest in and larger companies going shopping for innovative technologies. Focusing on individual acquisitions or startup launches ...
6 months ago Darkreading.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
6 months ago Microsoft.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 month ago Blog.checkpoint.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 month ago Esecurityplanet.com
CVE-2016-2084 - F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.x, 11.4.x before 11.4.1 build 685-HF10, 11.5.1 before build 10.104.180, 11.5.2 before 11.5.4 build 0.1.256, 11.6.0 before build 6.204.442, and 12.0.0 before build 1.14.628; BIG-IP ...
8 years ago
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
6 months ago Esecurityplanet.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
5 months ago Feeds.dzone.com
CVE-2023-35947 - Gradle is a build tool with a focus on build automation and support for multi-language development. In affected versions when unpacking Tar archives, Gradle did not check that files could be written outside of the unpack location. This could lead to ...
3 months ago
​​Microsoft named as a Leader in three IDC MarketScapes for Modern Endpoint Security 2024 - With these security concerns top of mind, there is no surprise that in the last five years, the Modern Endpoint Security market has nearly tripled in size to defend against emerging, sophisticated, and persistent threats. Microsoft Defender for ...
3 months ago Techcommunity.microsoft.com
A Practitioner's Guide to Security-First Design - Instead, organizations must proactively fortify their defenses and enter the era of security-first design - an avant-garde approach that transcends traditional security measures. Security-first design is an approach that emphasizes integrating robust ...
6 months ago Feeds.dzone.com
New Stellar Cyber Alliance to Deliver Email Security for SecOps Teams - Stellar Cyber, a Double Platinum 'ASTORS' Award Champion in the 2023 Homeland Security Awards Program, and the innovator of Open XDR has entered inao a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this ...
4 months ago Americansecuritytoday.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
4 months ago Techtarget.com
Understanding the 2024 Cloud Security Landscape - As we swiftly move towards the second quarter of 2024, predictions by cloud security reports highlight the challenges of cloud adoption in the cloud security landscape. This growing reliance on cloud infrastructure raises the critical issue of ...
3 months ago Feeds.dzone.com
CVE-2017-7923 - A Password in Configuration File issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 ...
6 years ago
CVE-2017-7921 - An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build ...
6 years ago
IaaS Security: Top 8 Issues & Prevention Best Practices - Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud. By exploring the top eight issues and preventative measures, as well as ...
6 months ago Esecurityplanet.com
Konica Minolta Wins Two Platinum 'ASTORS' Homeland Security Awards - ' Now in its ninth year, it continues to recognize industry leaders in physical and border security, cybersecurity, emergency preparedness management and response, law enforcement, first responders, and federal, state, and municipal government ...
3 months ago Americansecuritytoday.com
Gaining Insights on the Top Security Conferences - A Guide for CSOs - Are you a CSO looking for the best security events around the world? Well, you have come to the right place! This article is a guide to the top security conferences that offer essential security insights to help make informed decisions. Security ...
1 year ago Csoonline.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)