Episode 48

Preparing for the Next AI Cyber Attack

What will it take to defend against an expeditious AI antagonist? For one, speed. Detection time and time-to-remediate are key to preventing AI from chaining vulnerabilities in a complex, multi-pronged attack that will have security teams scrambling. Assessing weaknesses in our code is equally important, particularly the open source libraries we leverage that threat actors also have access to. Building reputation scores around those libraries is handy for determining how carefully they should be dealt with. And most importantly—don't panic, 𝗽𝗿𝗶𝗼𝗿𝗶𝘁𝗶𝘇𝗲.

Resources

Subscribe for updates

Please enter a business email
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Please enter a business email
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.