Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » AI and Security – the new puzzle that needs to be clarified
Global Security

AI and Security – the new puzzle that needs to be clarified

AdminBy AdminFebruary 13, 2025No Comments5 Mins Read
AI and Security
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


AI and security

AI is now everywhere, transforming how businesses work and how users are engaged in applications, devices and services. Many applications now have artificial intelligence, whether it is a chat interface support, intelligently analyzing data or the appropriate benefits of users. AI questions benefits users, but also brings new security issues, especially related security. Let’s learn what’s the problems and what you can do to face them with Okta.

Which II?

Everyone is talking about II, but this term is very common, and several technologies fall under this umbrella. For example, symbolic AI uses technologies such as logical programming, expert systems and semantic networks. Other approaches use neuronne networks, Bayesi networks and other tools. New Generative AI uses machine learning (ML) and large language models (LLM) as the main technologies to create content such as text, images, videos, audio, etc. Many applications we use today are creating content that work on ML and LLM. That’s why, when people talk about II, they probably imply ML and LLM based on AI.

AI Systems and AI, which operate on AI, have different levels of complexity and are exposed to different risks. Usually vulnerability in the AI ​​system also affects the applications that work on AI that depend on it. In this article, we will focus on the risks that affect the AI ​​applications, which most organizations have already started building or will be built in the near future.

Protect your Genai apps from identity threats

There are four important requirements that identity is crucial when building AI applications.

At first User authentication. Agent or app should know who the user is. For example, the chat may need to show the story of my chat or know my age and country to set the answers. This requires some form of identification that can be done with authentication.

By -second, Call API on behalf of users. AI agents connect to much more applications than a typical web application. Since Genai’s applications integrate with more products, the API will be critical.

Over -third, asynchronous workflows. AI agents may take longer to fulfill tasks or wait for difficult conditions. It may be minutes or hours, but it can also be days. Users haven’t been waiting for so long. These cases will become the main and will be implemented as asynchronous workflows, and agents work in the background. In these scenarios, people will act as executives by approving or rejecting the actions when from chatbate.

By -fourth, permit Removal of the supplemented generation (rags). Almost all Genai applications can provide information from multiple AI systems to implement a rag. To avoid disclosing information, all data provided in the AI ​​model to respond or act on the username must be data that the user has access permit.

We need to resolve all four requirements to realize all the Genai potential and help make sure our Genai applications are built securely.

Use II for help in protective attacks

AI also made it easier and faster to make the attackers the targeted attacks. For example, using AI to launch attacks on social engineering or creating deep pieces. In addition, attackers can use II to use vulnerabilities in scale applications. The reliably creation of the genes in applications is one of the tasks, and how using the II to help identify and respond to possible attacks faster with security threats?

Traditional security measures, such as the Foreign Ministry, are no longer enough. Integration of AI into your identity security strategy can help identify bots stolen sessions or suspicious activities. It helps us:

  • Make an intelligent signal analysis to detect unauthorized or suspicious access attempts
  • Analyze different signals related to applications access, and compare them to historical data in search of common models
  • Stop the session automatically if a suspicious activity is detected

AI -based app growth has a huge amount of potential, however, AI also creates new security issues.

What’s next?

AI changes the way of interacting people with technology and each other. In the next decade, we will see the growth of the huge AI AGEN – Networks interconnected AI programs that integrate into our applications and act autonomously for us. While Genai has a lot of positives, it also introduces significant safety risks to be considered when building AI applications. Allow builders to securely integrate Genai into their applications to make them AI and Enterprise ready.

The opposite side is how it can help in traditional security threats. AI applications face similar safety problems as traditional applications such as unauthorized access to information, but using new methods of attack malicious subjects.

AI is a reality for the better or worse. This brings countless benefits to users and builders, but at the same time problems and new problems on the side of security and everything in each organization.

Identity companies like AUTH0 Appear to help remove a piece of safety from a plate. Learn more about the construction of Genai Applications securely in AUTH0.AI.

Find out why the easy-to-do, adapted authentication platform and authorization-more-way way-Read on here.

Found this article interesting? This article is a contribution to one of our esteemed partners. Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025

Silver Fox Apt has on target Taiwan with sophisticated GH0Stcringe and Holdinghands Rats Malicious Programs

June 17, 2025

Google warns about scattered spider attacks focused on IT -commander by US insurance firms

June 17, 2025

Password “B” in Sitecore XP Sparks Sparks Erriss RCE when deploying businesses

June 17, 2025

Are you forgotten accounts of advertising services that leave you risk?

June 17, 2025

New Flodrix Botnet Option Operates Langflow Ai Server RCE BUG to launch DDOS ATTACKS

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025

Langsmith Bug can expose the Openai keys and users’ data through malicious agents

June 17, 2025

How to protect backups

June 17, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.