AI Governance, New Book ‘Code War’ from Allie Mellen, and the Weekly News with Jeremy Snyder, ESW #450

AI Governance, New Book 'Code War' from Allie Mellen, and the Weekly News with Jeremy Snyder, ESW #450

The Rise of AI Governance and the Growing Threat Landscape

As the use of artificial intelligence (AI) continues to grow, so do the risks associated with its adoption. Generative AI, in particular, has been disrupting businesses, products, and vendor risk management for several years. One company, FireTail, is working to address this problem for enterprises. In a recent interview, Jeremy Snyder, co-founder and CEO of FireTail, discussed the challenges of AI governance and the need for secure AI adoption.

According to Snyder, the AI governance problem is akin to the concept of “death by a thousand cuts.” The issue is not a single, catastrophic event, but rather a series of small, incremental risks that can add up to a significant threat.

FireTail’s platform provides visibility, insight, and control to enable secure AI adoption, helping organizations harness the full potential of AI safely and with confidence.

Related News

A new book titled “Code War: How Nations Hack, Spy, and Shape the Digital Battlefield” is set to be released. Written by Allie Mellen, a leading industry analyst, the book provides perspective on the cyber aspects of the ongoing war in Iran. Mellen’s expertise in detecting and responding to nation-state attacks makes her a valuable resource for the Global 2000.

The use of wipers on healthcare companies in the midst of conflict is a growing concern. Recently, the medical device maker Stryker was hit by a cyberattack, allegedly carried out by an Iran-linked group known as Handala. The attackers used administrative tools to wipe systems, push OS updates to personal phones connected to MDM, and left defacements on login pages. The incident highlights the need for robust security measures to protect against such threats.

Funding and New Tools

Several companies have raised funding for AI-driven security operations platforms, including Jazz, Cylake, JetStream Security, and Fig Security. Additionally, new tools have been released, such as the Crowdstrike API Key Canarytoken and the Google Workspace CLI.

Vulnerability Management

The vulnerability management space is also seeing disruption, with the release of new free tools such as The Signal and WiFi DensePose. Essays and reports have been published on topics such as quantifying cyber risk, the impact of AI on software development, and the importance of vulnerability management.

Breach Analysis and Legislation

In breach analysis, the Apache ActiveMQ exploit has been linked to the LockBit ransomware. Meanwhile, Google has warned that hackers are targeting third parties and software flaws. The CrowdStrike report highlights the need for rapid incident response, as attackers are moving through networks in under 30 minutes.

Legislation-wise, the long-awaited Trump cyber strategy has arrived, and it’s short and similar to previous discussions. The documentary “The Internet Was Weeks Away From Disaster and No One Knew” provides an excellent look at the XZ Utils incident.

Conclusion

In conclusion, the threat landscape is evolving rapidly, and the need for secure AI adoption and robust security measures is growing. As the use of AI continues to expand, it’s essential to stay informed and adapt to the changing landscape.



About Author

en_USEnglish