10 links
tagged with all of: cybersecurity + ai-security
Click any tag below to further narrow down your results
Links
OpenNHP is an open-source toolkit designed to implement Zero Trust security in an AI-driven environment by utilizing cryptography and advanced protocols to conceal server resources and ensure data privacy. It introduces the Network-infrastructure Hiding Protocol (NHP) and Data-object Hiding Protocol (DHP), which together enhance security against rising AI-driven cyber threats. With a focus on proactive defense and rapid response strategies, OpenNHP addresses vulnerabilities effectively while providing a modular architecture for scalability and integration with existing security systems.
Comet, an AI assistant, faces the challenge of malicious prompt injection, which manipulates its decision-making without exploiting software bugs. To combat this, Perplexity employs a defense-in-depth strategy that includes real-time detection, user controls, and transparent notifications to maintain user trust and safety.
The Critical AI Security Guidelines draft offers a comprehensive framework for securing AI deployments, focusing on multi-layered security approaches, governance adaptations, and risk management. Public comments are encouraged to enhance the guidelines, fostering community engagement and collaboration in developing AI security standards.
As AI becomes integral to security operations, the speed of cyber threats demands a shift away from human oversight in tactical responses. Emphasizing the need for AI security over AI safety, the article advocates for a containment strategy that allows AI to innovate within strict boundaries to ensure accountability and mitigate risks.
OpenAI has made its first investment in the cybersecurity sector, signaling a strategic move to enhance its capabilities in addressing cyber threats. The investment aims to bolster the security of AI technologies and safeguard user data against emerging cyber risks.
Check Point has acquired Lakera to enhance its capabilities in AI-driven security solutions, aiming to build a unified AI security stack. This acquisition is part of Check Point's strategy to address evolving cybersecurity threats with advanced technology.
The article discusses the current state of AI security readiness among organizations, emphasizing the importance of developing robust security measures to protect against potential AI-related threats. It highlights the challenges and strategies companies face in implementing effective AI security protocols.
Organizations are rapidly adopting AI technologies without sufficient security measures, creating vulnerabilities that adversaries exploit. The SANS Secure AI Blueprint offers a structured approach to mitigate these risks through three key imperatives: Protect AI, Utilize AI, and Govern AI, equipping cybersecurity professionals with the necessary training and frameworks to secure AI systems effectively.
HackerOne has disbursed $81 million in bug bounties over the past year, reflecting a 13% year-over-year increase. The demand for AI security has surged, with AI vulnerabilities rising by over 200%, while traditional vulnerabilities like XSS and SQL injection are declining. A significant number of researchers are now utilizing AI tools to enhance their security testing efforts.
Google DeepMind has released a white paper detailing the security enhancements made to Gemini 2.5, focusing on combating indirect prompt injection attacks which pose cybersecurity risks. The article highlights the use of automated red teaming and model hardening to improve Gemini's defenses, ensuring the AI can better recognize and disregard malicious instructions while maintaining performance on normal tasks.