Physical Address

304 North Cardinal St.
Dorchester Center, MA 02124

How Cisco’s AI Defense aims to stop cyber threats you never see


This article is part of Venturebeat’s special number, “Cyber ​​Standing PlayBook: walk the new threat period.” Read more Here is a special issue.

As AI adoption accelerates, lightning-rapid adaptation creates security paradox – How does the teams always protect a system that constantly developing it in widespread.

Anserverarial AI is now a secret cyber war is a source of danger. Enemies arms each side of the EU, including each side Great Language Models (LLS). The rapid adoption of the AI ​​is the opening of new attack surfaces, which security teams cannot use current security technologies.

The sub-line is rapidly growing rapidly with the casualties between the AI ​​and the Defense AI, the safety of enterprises and financial stability hanged in the balance sheet. From the information poisoning, enemies are already exploited by AI’s weaknesses, and the technology is transformed into a vector for misconceptions, security violations.

Cisco helps to close the gaps

Cisco’s AI defense strategy Anserial AI aims to close this expanding gaps and enterprises between Tradecraft and the potential to damage enterprises. Until 2028, Most Cen AI placements are expected to not be security until 2028, Cisco sets time.

Burnisher also reverorted in Developing technical impact radar: Cloud security In the 2028 GEN EU, infrastructures will be placed in infrastructures on infrastructures, which are not covered by infrastructures, and the cyber in unprecedented scale of enterprises.

No job does not allow to procrastinate AI models – they need to help apply to the paradox of such a highly adaptable asset that can be easily armed without knowledge.

In January, Cisco’s AI Protection This conundrum, integrated into real-time monitoring, model approval and policy implementation, appeals to this conduit.

Unusual war: AI as an attack surface

It is the ability to learn and adapt itself to the largest power and enterprises of the EU. But this is his greatest weakness. AI models are not a deticiency, meaning that the meaning changes in time. This unexpected creates security blind spots, which aggressors exploited.

The evidence of the secret kiberva, as paradox grows wider, proven how heavy. Instructions for poisoning are instructions that violate the training information that causes AI biased, flaw or production of AI Dangerous performances. Injection attacks are designed to detect a Sensitive customer information on AI chatbots or perform the commands that cause models and data. Model Exfiltration targets the owner AI models that steal intellectual property and violating a company’s competitive advantage.

Shadow AI – or unauthorized use of AI tools, without accidental (or not), without any unauthorized use of employees (or do not), contributes to a growing problem.

Ceetu Patel, EUR and CPO told Venturebeat in Cisco: “Business and technology leaders do not allow security for speed when hugs.

Just put: a game that loses speed without security.

Cisco AI Defense: A new approach to AI security

Cisco’s AI protection is placed in the network infrastructure, network infrastructure to launch and use, use, use and use, use and use.

It gives a platform in his nucleus:

  • AI view and shade AI detection: Security teams have a real-time vision to unauthorized EU applications, the ability to see if sanctions and unauthorized AI applications, which uses EU and suitable for security policy.
  • Automatic model confirmation and red team: Cisco’s AI algorithmic red team is made of him Firm intelligence The purchase is working with trillions of trillions, which determine the opprinions before clashes.
  • Execution time AI Safety and Adaptive application: AI models are constant verification to detect and block and block emergency injections, information poisoning and controversial operations in real time.
  • Prevention of access control and data loss (DLP): Enterprises can prevent unauthorized AI usage, apply security policy and ensure that sensitive information does not leak to external AI models.

By entering the AI ​​security into the Ciscon’s network fragment, the AI ​​protection ensures intrination for AI security institutional operations.

AI Defense Security divides the EU manageable enterprises to DNA

For the results, it is afraid to worry and fall behind the opponents, more organizations are in a hurry to place AI on a scale of AI. Increased “place now, then reliable” the results in a hurry, are risky and helping to attack the intention to attack the target organizations attacking the hidden cyberwar fuel.

Cisco’s 2024 AI Headely Index Only 29% of enterprises found that it felt equipped to change and prevent unauthorized AI. This means that 71% of enterprises are vulnerable to EU managing cyberatis, compliance violations and disastrous AI failures.

Gartner, the traditional end point may not have to apply for the AI ​​processing mechanisms of enterprises Protect AI models from controversial attacks.

Enterprises must be in the future:

  • Take Unified AI Security Frames: Security solutions are unified, automated and incrastructure included.
  • Apply AI Threatening Exploration and Sustainable Assessment: AI models require constant monitoring as the threat change changes very rapidly for static defense.
  • Provide AI compatibility in very cloudy environments: Regulatory frames are squeezed on a global scale. Enterprises must adapt the AI ​​security policy with the EU ACT and NIST AI security framework.

Cisco AI Defense: An enterprise against evolving threats AI

AI is the future of enterprise innovation, but is not guaranteed aI. Ai not protected from the left, can be exploited, operating and armed by cybercriminals.

Cisco AI protection is not only a security tool – this is an enterprise width AI security strategy. In real mode, Cisco sets a new standard for AI monitoring, automated model approval and integration of network-installed protection bodies.

According to Patel warning: “AI security problems are new and complicated, with weaknesses, applications, applications and supply chains. We must think differently, the enterprises are boldly innovated without trade.”



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *