• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Google Launches Framework to Secure Generative AI

You are here: Home / General Cyber Security News / Google Launches Framework to Secure Generative AI
June 9, 2023

Generative AI is advancing fast, but so are inventive strategies people today find to use it maliciously. Many governments are hoping to velocity up their regulating plans to mitigate the risk of AI misuse.

Meanwhile, some generative AI developers are wanting into how they could assistance protected their designs and solutions. Google, proprietor of the generative AI chatbot Bard and dad or mum enterprise of AI research lab DeepMind, launched its Protected AI Framework (SAIF) on June 8, 2023.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


SAIF is established to be “a bold and dependable, […] conceptual framework to support collaboratively secure AI technology,” Royal Hansen, Google’s VP of engineering for privacy, security and security, and Phil Venables, CISO of Google Cloud, wrote in a launching paper.

The work builds on Google’s knowledge creating cybersecurity models, this kind of as the collaborative Provide-chain Ranges for Software package Artifacts (SLSA) framework and BeyondCorp, its zero rely on architecture made use of by several organizations.

Particularly, SAIF is “a to start with step” created to enable mitigate challenges specific to AI devices like theft of the design, information poisoning of the coaching info, destructive inputs by way of prompt injection and extracting confidential details in the coaching info.

SAIF is developed all-around six core concepts:

  • Grow solid security foundations to the AI ecosystem, including leveraging safe-by-default infrastructure protections (e.g. SQL injection mitigation strategies)
  • Lengthen detection and response to convey AI into an organization’s danger universe: monitoring inputs and outputs of generative AI devices to detect anomalies and making use of risk intelligence to foresee attacks
  • Automate defenses to hold rate with present and new threats
  • Harmonize platform-amount controls to assure regular security throughout the firm, setting up with Google-owned Vertex AI and Security AI Workbench, and Perspective API, a cost-free and open source API made by Google’s Jigsaw and Counter Abuse Technology groups that makes use of equipment studying to identify ‘toxic’ opinions online
  • Adapt controls to alter mitigations and produce more rapidly responses loops for AI deployment, together with techniques like reinforcement studying based on incidents and person responses, updating coaching facts sets, wonderful-tuning types to reply strategically to attacks and pink team exercising
  • Contextualize AI procedure dangers in surrounding company procedures by conducting conclude-to-stop risk assessments relevant to how organizations will deploy AI
  • “We will shortly publish a number of open up-source resources to aid place SAIF elements into practice for AI security,” Hansen and Venables explained.

    They also vowed to broaden Google’s bug hunter systems to reward and incentivize investigation all-around AI protection and security.

    Go through far more: Ethical Hackers Could Earn up to $20,000 Uncovering ChatGPT Vulnerabilities

    Finally, they explained that Google was committed to encouraging acquire intercontinental specifications on AI security, this sort of as the US Nationwide Institute of Requirements and Technology’s (NIST) AI Risk Management Framework and Cybersecurity Framework, as properly as ISO/IEC 42001 AI Administration Method and ISO/IEC 27001 Security Management Technique standards.


    Some areas of this report are sourced from:
    www.infosecurity-magazine.com

    Previous Post: «5 reasons why access management is the key to securing 5 Reasons Why Access Management is the Key to Securing the Modern Workplace
    Next Post: Barracuda Urges Swift Replacement of Vulnerable ESG Appliances Cyber Security News»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
    • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
    • 6 Steps to 24/7 In-House SOC Success
    • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
    • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
    • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
    • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
    • Secure Vibe Coding: The Complete New Guide
    • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
    • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

    Copyright © TheCyberSecurity.News, All Rights Reserved.