Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could intercept models in transit, manipulate inputs to degrade performance, or even… Continue reading Deploying AI at the edge: The security trade-offs and how to manage them

Platformization is key to reduce cybersecurity complexity

Organizations are facing security complexity challenges as they juggle an average of 83 different security solutions from 29 vendors, according to a report by IBM and Palo Alto Networks. It also shows 7 out of 10 surveyed companies with a high degree o… Continue reading Platformization is key to reduce cybersecurity complexity

DeepSeek Locked Down Public Database Access That Exposed Chat History

Research Firm Wiz Research began investigating DeepSeek soon after its generative AI took the tech world by storm. Continue reading DeepSeek Locked Down Public Database Access That Exposed Chat History

Conifers.ai Scores $25M Investment for Agentic AI SOC Technology

Backed by SYN Ventures, Conifers.ai plans to use “agentic AI” technology to tackle complex security operations center (SOC) problems.
The post Conifers.ai Scores $25M Investment for Agentic AI SOC Technology appeared first on SecurityWeek.
Continue reading Conifers.ai Scores $25M Investment for Agentic AI SOC Technology

Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats

Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the invisibility and wrongful use of Shadow AI.
The post Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hid… Continue reading Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats

Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information

An unprotected database belonging to Chinese AI company DeepSeek exposed highly sensitive information, including chat history, secret keys, and backend data.
The post Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information appeared fir… Continue reading Unprotected DeepSeek Database Exposed Chats, Other Sensitive Information

89% of AI-powered APIs rely on insecure authentication mechanisms

APIs have emerged as the predominant attack surface over the past year, with AI being the biggest driver of API security risks, according to Wallarm. “Based on our findings, what is clear is that API security is no longer just a technical challenge – i… Continue reading 89% of AI-powered APIs rely on insecure authentication mechanisms

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks. However, this heightened attention to emerging threats makes […]

The post AI and cloud vulnerabilities aren’t the only threats facing CISOs today appeared first on Security Intelligence.

Continue reading AI and cloud vulnerabilities aren’t the only threats facing CISOs today