3 Ways to Bolster Security This Cybersecurity Awareness Month
Briefly

3 Ways to Bolster Security This Cybersecurity Awareness Month
"AI is the next big hurdle for security teams, especially on the software development side. Companies need to make sure that users don't use AI to create hacking bots either on purpose or accidentally. They also need AI access controls so that AI can only access the services it should. Otherwise you leave yourself open to bad actors who could force agents to access bad sources. Visibility into AI activity is key to safe use."
"Agentic AI adoption is increasing at breathtaking speed due to the huge efficiency improvements, but it also throws challenges like shadow AI, AI access controls and of course AI-targeted security attacks like zero-day threats, etc. For both Agentic AI developers, vendors and AI consumers (enterprises using AI agents), it is imperative to give visibility into shadow AI, protect their networks and infrastructure, and do all these without compromising performance of the AI Agents."
"Most AI agent developers are focused on efficiency, not security. The first step for security teams is to create visibility. Establish a way to monitor AI to see what it's accessing, which users are using it, and what they're using it for. If you don't have an AI policy already, you need to create one now."
October marks Cybersecurity Awareness Month and provides an opportunity to realign security priorities to reflect the modern threat landscape. Organizations must increase visibility into AI and agentic AI by monitoring AI activity, tracking which users employ AI, and enforcing AI access controls. Establishing AI policies is essential to prevent accidental or intentional misuse, such as creating hacking bots or forcing agents to access malicious sources. Agentic AI adoption introduces shadow AI, AI-targeted attacks, and performance-security tradeoffs, requiring visibility without degrading agent efficiency. Adversarial state actors are pre-positioning in critical infrastructure and on edge gear, necessitating bolstered identity security and stronger protections for networks and infrastructure.
Read at Securitymagazine
Unable to calculate read time
[
|
]