pwshub.com

Embedding AI security from the get go

Sponsored Post The dawn of artificial intelligence is upon us, but its development has only just begun.

Research suggests there will be just 250m users of AI enabled applications and services this year, a number which will double by 2027 and hit 1bn by 2029 as companies find new, more innovative ways to harness the technology. And while the number of native AI applications currently available is around 2,000, a lot more are in the pipeline.

But other people are at the same game. Cyber criminals too are busy moulding AI to their own purposes. Which is likely to mean a larger volume of more efficient cyber attacks designed to steal and disrupt mission critical data and services are on the way.

You can hear a lot more about these trends in this keynote speech – Preparing you for a brand-new fight: The future of cybersecurity and AI' – delivered by Palo Alto Networks CEO Nikesh Arora.

Nikesh provides an interesting snapshot of current AI usage and development, and goes on to explain how organizations can harness the power of AI and ML to strengthen their cyber defenses.

The biggest risk comes perhaps not from external threats but internal employees not understanding how AI is being used within the organization – how it is collecting and processing sensitive data for example. What's needed, says Nikesh, is more better visibility, control and governance to make sure the benefits of AI can be fully enjoyed without any of the risks.

Palo Alto Networks is using AI to make its cybersecurity products and services not only simple to use, but very good at tracking the flow of data across the IT estate in order to understand where it's most vulnerable. That's partially enabled by making sure that applications designed for the AI world are secure by design from their inception.

You can watch Nikesh Arora's keynote by scrolling over the video above.

Sponsored by Palo Alto Networks.

Source: theregister.com

Related stories
1 month ago - Here's how to get started with the open source tool Continue Hands-on Code assistants have gained considerable attention as an early use case for generative AI – especially following the launch of Microsoft's GitHub Copilot. But, if you...
4 days ago - CEO argues more restrictive licensing was key to DB refresh, and says team 'expected' the fork Interview Redis is the most popular database on AWS, which is, of course, the most popular cloud. The fact the relatively little known...
1 month ago - Because apps talking like pirates and creating ASCII art never gets old Despite worries about criminals using prompt injection to trick large language models (LLMs) into leaking sensitive data or performing other destructive actions, most...
5 days ago - Chatbots, generative models 'in many ways the next step in the surveillance economy' Web browsers now commonly sport AI services provided by on-device or cloud-based models. However, a few holdouts remain convinced it's a bad idea.…
1 month ago - Using Precision AI to stop cyber threats in real time Sponsored Hackers and cyber criminals are busy finding new ways of using AI to launch attacks on businesses and organisations often unprepared to deal with the speed, scale and...
Other stories
2 minutes ago - You pipsqueaks want memory safety? We'll show you memory safety! We'll borrow that borrow checker After two years of being beaten with the memory-safety stick, the C++ community has published a proposal to help developers write less...
31 minutes ago - We tested multiple types of adjustable dumbbells, and these are the ones that made the cut.
31 minutes ago - More states are offering the ability to change your Medigap coverage to purchase a cheaper plan without a physical exam.
31 minutes ago - Why You Can Trust CNET Our expert, award-winning staff selects the products we cover and rigorously researches and tests our top picks. If you buy...
31 minutes ago - Revised App Review Guidelines are now being applied to iPadOS 18, the latest version of its iPad-exclusive operating system. The OS will give European users the ability to access apps from third-party sources beyond the traditional App...