Network Security, Cloud Security, AI/ML
BrandView
Network security in the age of AI: A brand new fight

(Adobe Stock)
The latest rapid developments in AI and GenAI are a new juncture in the IT and cybersecurity landscape. They present new business opportunities, growing challenges for enterprise security, and the need for new capabilities in security platforms.Although the debate over cybersecurity platforms versus point solutions has been a hot topic in cybersecurity for years, the new security challenges from enterprise AI adoption reinforce the need for a consolidated platform approach.As with security paradigms like Zero Trust, SASE, and SSE, optimal security in the age of AI benefits from centralized management, consistent enforcement, and unified monitoring. It makes a consolidated security platform the foundational component of modern cybersecurity infrastructure, able to combat new threats from AI adoption, reduce complexity, simplify security operations, reduce costs, and improve overall levels of security.In particular, the most advanced modern security platforms must comprehend how AI changes the enterprise attack surface and be able to mitigate the new, very real, and substantial risks of those changes.Eliminate the data and security risks associated with employees accessing and using Generative AI (Gen AI) applications. Enable rapid Gen AI application development by reducing risk in the AI application stack and supply chain. Provide runtime protection against new attacks targeting their AI ecosystem. New Attack Surface #1: Employee AI AdoptionBecause of their extraordinary capabilities, AI-powered applications and large-language models (LLMs) have opened up new data security issues and expanded the attack surface. As adoption snowballs, these applications become more enticing and profitable targets for attackers. A recent Salesforce survey of over 14,000 workers found that 55% of employees use unapproved Gen AI at work. With dozens of new AI applications being launched every month, it is only a matter of time before there are AI applications for every employee and every use case.This new type of shadow IT usage can expose organizations to data leakage and malware. At the same time, according to TechTarget’s Enterprise Strategy Group, 85% of businesses have proprietary LLMs planned or already built into products generally available to their customers. Shadow IT is morphing into shadow AI. Employees gravitate toward what is convenient and makes them more productive, creating significant challenges for a robust security posture.New Attack Surface #2: The AI Supply ChainEmployee use of third-party AI is not the only way AI is making its way into the enterprise. Innovative organizations realize they can improve both their top and bottom lines by supercharging their own applications with AI. As that happens, new AI components get added to application stacks, increasing the potential for exposure of sensitive data via training and inference datasets.Reducing security risks in the AI development supply chain will be increasingly important to enterprises as they need to identify vulnerabilities and exposure in their AI-based applications.New Attack Surface #3: The Entire AI Ecosystem at RuntimeIn addition to protecting the AI development supply chain, the security of AI components extends to the runtime use of applications that depend on these new supply chains. Runtime threats to these AI ecosystems include prompt injections, malicious responses, LLM denial-of-servicetraining data poisoning and foundational runtime attacks, such as malicious URLs, command and control, and lateral threat movement.
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds