<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/william-graf/rss" /><link>https://www.ivanti.com/blog/authors/william-graf</link><item><guid isPermaLink="false">c2023b49-83dc-46ed-b086-7a166bd98284</guid><link>https://www.ivanti.com/blog/exposure-management-vs-vulnerability-management</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/blog/authors/william-graf</atom:uri></atom:author><category>Security</category><title>Exposure Management vs. Vulnerability Management: Which Delivers Real Risk Reduction?</title><description>&lt;p&gt;Vulnerability management has served organizations and the cybersecurity industry for years. It is a capable practice that has helped companies defend their attack surface and prevent threat actors from exploiting vulnerabilities.&lt;/p&gt;

&lt;p&gt;But technology and IT infrastructure have evolved. Vulnerability management no longer can meet the challenges that come with this evolution. Now, &lt;a href="https://www.ivanti.com/exposure-management"&gt;exposure management&lt;/a&gt; is here to provide an even more holistic approach to endpoint security that covers the areas vulnerability management falls short in.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/em_vs_vm_hero_diagram_1.png"&gt;&lt;/p&gt;

&lt;p&gt;Let’s dive into the distinctions so that you can decide how to protect your organization.&lt;/p&gt;

&lt;h2&gt;What is vulnerability management?&lt;/h2&gt;

&lt;p&gt;Vulnerability management is a cybersecurity practice that includes continuous and proactive identification, assessment, prioritization and remediation of vulnerabilities hackers can use to infiltrate your organization.&lt;/p&gt;

&lt;p&gt;However, it’s important to note that there are two different types of vulnerability management:&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Legacy vulnerability management &lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Risk-based vulnerability management &lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;Involves attempting to remediate as many vulnerabilities as possible. This often results in substantial effort and unrealistic expectations for success while presenting a false sense of security.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;An evolved vulnerability management practice that accounts for risk in vulnerability prioritization. This allows organizations to patch the critical vulnerabilities that pose a real-world threat, protecting your organization from threat actors while also ensuring a strong security posture and effectively managing resources.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;A &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt; approach goes beyond legacy vulnerability management, providing your organization with the following benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Continuously monitors vulnerabilities for proactive security.&lt;/li&gt;
	&lt;li&gt;Identifies actively exploited exposures.&lt;/li&gt;
	&lt;li&gt;Enables effective remediation efforts.&lt;/li&gt;
	&lt;li&gt;Reduces risk.&lt;/li&gt;
	&lt;li&gt;Assists organizations with reaching compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;While risk-based vulnerability management covers a lot of bases, it still doesn’t offer the holistic approach to cybersecurity that organizations need to stay safe and secure. That’s where exposure management comes into the picture.&lt;/p&gt;

&lt;h2&gt;What is exposure management?&lt;/h2&gt;

&lt;p&gt;Exposure management is an evolving cybersecurity practice that provides comprehensive visibility across your entire attack surface. It allows IT and Security teams to identify exactly where your organization may be exposed while including risk-based prioritization, remediation and more. Exposure management focuses on maintaining an organization’s self-determined &lt;a href="https://www.ivanti.com/blog/risk-appetite"&gt;risk appetite&lt;/a&gt;. Therefore, it encompasses four stages:&lt;/p&gt;

&lt;p&gt;&lt;img alt="graphic of 4 circles" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/em_vs_vm_hero_diagram_2.png"&gt;&lt;/p&gt;

&lt;p&gt;Like risk-based vulnerability management, exposure management helps prioritize which vulnerabilities and exposures should be addressed first based on real-world risk, but it goes further by factoring in what is most relevant to your specific business. This cybersecurity approach ensures that the highest-risk exposures are remediated proactively, before they can be exploited by attackers.&lt;/p&gt;

&lt;h2&gt;Exposure management vs. vulnerability management: What’s the difference?&lt;/h2&gt;

&lt;p&gt;Exposure management represents the next evolution beyond traditional vulnerability management. While vulnerability management primarily focuses on identifying and addressing weaknesses in servers and endpoints, exposure management expands this scope by delivering complete visibility across the entire attack surface.&lt;/p&gt;

&lt;p&gt;In terms of key differences, these include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Exposure management is designed for newer types of assets: Modern IT environments have grown increasingly complex, now including assets such as Software-as-a-Service (SaaS) applications, IoT devices, cloud infrastructure and more. Exposure management is designed to account for these &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;newer kinds of assets&lt;/a&gt;, ensuring IT and security teams can identify risks wherever they exist in the organization. By doing so, exposure management provides a comprehensive understanding of all potential entry points. This empowers organizations to manage and reduce risk more effectively than ever before.&lt;/li&gt;
	&lt;li&gt;Exposure management understands the reality and champions a risk appetite approach: Again, vulnerability management is centered around patching vulnerabilities. While risk-based vulnerability management provides risk prioritization and remediation orchestration, the practice doesn’t acknowledge the fact that it’s not realistic for an organization to patch every vulnerability. The term risk appetite is an organization’s self-determined measurement of how much risk it is willing to accept. This is a significantly more realistic approach that rallies the organization together to achieve shared KPIs to measure success consistently across teams.&lt;/li&gt;
	&lt;li&gt;Exposure management goes beyond CVEs and CVSS: Vulnerability management focuses primarily on &lt;a href="https://www.ivanti.com/blog/common-vulnerability-scoring-system-cvss"&gt;common vulnerabilities and exposures (CVEs)&lt;/a&gt;. While CVEs are an important target for most organizations, they are not the only catalysts that threat actors can use to cause damage to your organization. Hackers can still leverage the following exposures (that vulnerability management doesn’t cover) to infiltrate your organization:&lt;/li&gt;
	&lt;li&gt;Misconfigurations.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/application-security-posture-management"&gt;Application security&lt;/a&gt; issues.&lt;/li&gt;
	&lt;li&gt;IT system policies.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/products/app-control-and-privileged-management"&gt;Privileged access controls&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tying it back to the holistic approach, exposure management covers all these modern assets. Furthermore, vulnerability management is heavily reliant on the Common Vulnerability Scoring System (CVSS) for remediation prioritization. While CVSS is a solid measurement for severity, it provides an effective risk-adjusted perspective.&lt;/p&gt;

&lt;p&gt;Risk is an important factor to keep in mind since it includes whether a vulnerability has been exploited, if it has ties to ransomware/malware or is currently trending. Not factoring risk creates a false sense of urgency with CVSS, causing IT and security teams to waste time and resources on vulnerabilities that are not truly urgent.&lt;/p&gt;

&lt;h2&gt;How to safeguard your organization&lt;/h2&gt;

&lt;p&gt;Now that we have covered the differences between exposure management and vulnerability management, it’s time to leverage the advantages that exposure management provides. Learn how Ivanti’s &lt;a href="https://www.ivanti.com/exposure-management"&gt;exposure management&lt;/a&gt; portfolio can elevate your IT and security teams.&lt;/p&gt;
</description><pubDate>Thu, 29 Jan 2026 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">9c867c0d-47f9-4ab6-aa8d-2fad6f5943e8</guid><link>https://www.ivanti.com/blog/understanding-external-attack-surface-management</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/blog/authors/william-graf</atom:uri></atom:author><category>Security</category><title>Understanding External Attack Surface Management: How It Works and Why It’s More Critical Than Ever</title><description>&lt;p&gt;Attack surfaces can expand without your organization even realizing it. And, lacking visibility into your external-facing assets and the vulnerabilities they may contain can lead to significant security risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;External attack surface management (EASM)&lt;/a&gt; is a cybersecurity approach designed to safeguard your external assets and strengthen your organization's overall security posture. It does this by providing full visibility into these assets (and associated vulnerabilities) that could be exploited by threat actors.&lt;/p&gt;

&lt;p&gt;In this article, we’ll walk you through how EASM works, the risks involved with overlooking your external attack surfaces, the benefits as well as where EASM sits in the broader practice of exposure management.&lt;/p&gt;

&lt;h2&gt;How external attack surface management works&lt;/h2&gt;

&lt;p&gt;EASM is the practice of identifying and managing your external-facing assets (e.g., websites, APIs, etc.) to prevent security breaches. Additionally, the process includes &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;identifying attack surface gaps&lt;/a&gt; that can expose&amp;nbsp;your organization to cybersecurity risks.&lt;/p&gt;

&lt;p&gt;EASM helps fight unwanted expansion of your attack surface through visibility, enabling your organization to stay up to date on your potential vulnerabilities. Leveraging EASM provides the following benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Additional source of discovery and asset visibility.&lt;/li&gt;
	&lt;li&gt;Curbs cloud sprawl and shadow IT.&lt;/li&gt;
	&lt;li&gt;Reduces AI-powered phishing tactics.&lt;/li&gt;
	&lt;li&gt;Analyzes and prioritizes exposures.&lt;/li&gt;
	&lt;li&gt;Detects data leakage.&lt;/li&gt;
	&lt;li&gt;Reduces phishing and social engineering attacks.&lt;/li&gt;
	&lt;li&gt;Adheres to regulatory compliance requirements.&lt;/li&gt;
	&lt;li&gt;Extend your vendor risk management by providing external risk perspective of third-party vendors.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;EASM involves multiple key stages, including Discovery, Assessment, Prioritization, Reporting and Remediation.&lt;/p&gt;

&lt;h3&gt;Discovery&lt;/h3&gt;

&lt;p&gt;As mentioned above, EASM involves monitoring your external attack surface to identify those assets to both catalog them and uncover vulnerabilities that could lead to a hacker infiltrating your organization.&lt;/p&gt;

&lt;p&gt;It doesn’t involve an invasive scan. Rather, it involves a passive crawl of your external attack surface, and all you need is a URL to start the process. EASM solutions, for example, use public data in combination with security intelligence.&amp;nbsp; The assets that make up your external attack surface include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Web servers.&lt;/li&gt;
	&lt;li&gt;DNS servers.&lt;/li&gt;
	&lt;li&gt;IoT devices.&lt;/li&gt;
	&lt;li&gt;Network edge devices.&lt;/li&gt;
	&lt;li&gt;Application servers.&lt;/li&gt;
	&lt;li&gt;Certificates.&lt;/li&gt;
	&lt;li&gt;Cloud-based tools.&lt;/li&gt;
	&lt;li&gt;Shadow IT.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more: &lt;a href="https://www.ivanti.com/blog/attack-surface-discovery"&gt;How to Identify Your Organization’s Attack Surface&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Assessment&lt;/h3&gt;

&lt;p&gt;Thorough and continuous assessment is essential to understand your organization's risk landscape and effectively prioritize remediation efforts. At this stage, your organization evaluates whether the assets identified during the discovery process are in use and if they are harboring vulnerabilities. EASM solutions do this by identifying publicly disclosed security weaknesses, outdated software versions and more.&lt;/p&gt;

&lt;p&gt;By examining these assets for vulnerabilities and other potential security risks, you gain crucial insights into your security posture.&lt;/p&gt;

&lt;h3&gt;Prioritization&lt;/h3&gt;

&lt;p&gt;Once vulnerabilities are identified, the next step is to determine which ones to address first based on their risk to your organization. Since it’s often impractical to remediate every vulnerability, &lt;a href="https://www.ivanti.com/blog/vulnerability-prioritization-guide"&gt;risk scoring methods&lt;/a&gt; help you assess the urgency and impact of each exposure. This allows your security teams to focus on the most critical issues, streamlining the remediation process and ensuring that resources are allocated effectively.&lt;/p&gt;

&lt;h3&gt;Reporting and remediation&lt;/h3&gt;

&lt;p&gt;The next stage in EASM is to report on these risks and begin remediation. EASM solutions enable you to generate comprehensive reports that offer an overview of your external attack surface, along with detailed breakdowns of critical vulnerabilities. These reports are invaluable for communicating the nature and urgency of potential threats, helping stakeholders understand the importance of prompt remediation and informing decisions.&lt;/p&gt;

&lt;h2&gt;The risks involved with not monitoring your external attack surface&lt;/h2&gt;

&lt;p&gt;&lt;img alt="Central gray circle labeled &amp;quot;Attack Surface&amp;quot; surrounded by four colored circles labeled &amp;quot;Shadow IT,&amp;quot; &amp;quot;Cloud-Based Tools,&amp;quot; &amp;quot;Supply Chain Partners,&amp;quot; and &amp;quot;IoT Devices,&amp;quot; each with relevant icons, illustrating different factors that expand an organization’s attack surface." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram1-attack-surface.png"&gt;&lt;/p&gt;

&lt;p&gt;If your organization does not have full knowledge of the external attack surface, you risk having unknown or unmonitored assets or misconfigurations that open you up to attack, resulting in reputational damage, financial loses and more.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The lack of visibility into shadow IT, misconfigured or forgotten services allows for easy entry points for attackers. &lt;a href="https://www.computerweekly.com/news/366558437/Shadow-IT-use-at-Okta-behind-series-of-damaging-breaches" rel="noopener" target="_blank"&gt;According to Computer Weekly&lt;/a&gt;,&amp;nbsp; identity and access management company Okta was exposed to multiple security breaches due to shadow IT.&lt;/p&gt;

&lt;p&gt;Furthermore, these assets are visible to anyone on the internet. It doesn’t require any special skills for someone to obtain this information about your external attack surface, meaning it is straightforward for a threat actor to gain access to your organization if you don’t enact proper measurements.&lt;/p&gt;

&lt;p&gt;Now that you have an overview of external attack surface management, it’s important to understand that it’s just one part of your larger attack surface, which is where &lt;a href="https://www.ivanti.com/glossary/exposure-management"&gt;exposure management&lt;/a&gt; comes into play.&lt;/p&gt;

&lt;h2&gt;How EASM plays into exposure management&lt;/h2&gt;

&lt;p&gt;&lt;img alt="Side-by-side columns titled &amp;quot;Exposure Assessment&amp;quot; in purple and &amp;quot;Exposure Remediation&amp;quot; in red. Under &amp;quot;Exposure Assessment&amp;quot; are boxes labeled Visibility, Aggregation and Prioritization, Cyber Asset Discovery and Inventory, Proactive Self-Healing, External Attack Surface Management (EASM), Risk-Based Vulnerability Management (RBVM), and Vulnerability Intelligence. Under &amp;quot;Exposure Remediation&amp;quot; are boxes labeled Mobilization, Remediation, IT Service Management (ITSM), Proactive Self-Healing, and Remediation." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram2-ivanti-exposure-management.png"&gt;&lt;/p&gt;

&lt;p&gt;Exposure management focuses on asset visibility, exposure aggregation, risk-based prioritization and remediation of exposures. It’s a comprehensive cybersecurity practice that helps organizations define their risk appetite and keep levels within acceptable bounds.&lt;/p&gt;

&lt;p&gt;EASM is just one part of exposure management (visibility, as shown in the graphic above).&amp;nbsp; In cybersecurity, you can’t protect what you can’t see. So, let Ivanti help you get full visibility into your external attack surface with &lt;a href="https://www.ivanti.com/products/external-attack-surface-management"&gt;Ivanti Neurons for EASM&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 02 Dec 2025 15:06:33 Z</pubDate></item><item><guid isPermaLink="false">df0eabfd-fa6d-4ee5-aa07-8f09e2717296</guid><link>https://www.ivanti.com/blog/ai-cybersecurity-best-practices-meeting-a-double-edged-challenge</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/blog/authors/william-graf</atom:uri></atom:author><atom:author><atom:name>Mike Lloyd</atom:name><atom:uri>https://www.ivanti.com/blog/authors/mike-lloyd</atom:uri></atom:author><category>Security</category><category>Artificial Intelligence</category><title>AI Cybersecurity Best Practices: Meeting a Double-Edged Challenge</title><description>&lt;p&gt;Artificial intelligence is already showing its potential to reshape nearly every aspect of cybersecurity – for good and bad.&lt;/p&gt;

&lt;p&gt;If anything represents the proverbial double-edged sword, it might be AI: It can act as a formidable tool in creating robust cybersecurity defenses or can dangerously compromise them if weaponized.&lt;/p&gt;

&lt;h2&gt;Why is AI security important?&lt;/h2&gt;

&lt;p&gt;It’s incumbent upon organizations to understand both the promise and problems associated with AI cybersecurity because of the ubiquity of all iterations of AI in global business. Its use by bad actors is already a source of concern.&lt;/p&gt;

&lt;p&gt;According to McKinsey, &lt;a href="https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai" rel="noopener" target="_blank"&gt;AI adoption by organizations surged to 72% in 2024, up from about 50% in prior years&lt;/a&gt; across multiple regions and industries. But the intricate nature and vast data requirements of AI systems also make them prime targets for cyber-attacks. For instance, input data for AI systems can be slyly manipulated in adversarial attacks to produce incorrect or damaging outputs.&lt;/p&gt;

&lt;p&gt;A compromised AI can lead to catastrophic consequences, including data breaches, financial loss, reputational damage and even physical harm. The prospect for misuse is immense, underscoring the critical need for robust AI security measures.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Research by the &lt;a href="https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2024.pdf" rel="noopener" target="_blank"&gt;World Economic Forum&lt;/a&gt; found that almost half of executives worry most about how AI will raise the risk level from threats like phishing. Ivanti’s &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank"&gt;2024 cybersecurity report&lt;/a&gt; confirmed those concerns.&lt;/p&gt;

&lt;div class="flourish-embed flourish-chart" data-src="visualisation/16336537"&gt;&lt;/div&gt;

&lt;p&gt;Despite the risks, the same Ivanti report found that IT and Security professionals are largely optimistic about the impact of AI cybersecurity. Almost half (46%) feel it’s a net positive, while 44% think its impact will be neither positive nor negative.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Read more: &lt;a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report" target="_blank"&gt;2024 State of Cybersecurity Report - Inflection Point&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Potential AI cyber threats&lt;/h2&gt;

&lt;p&gt;AI introduces new attack vectors that require specific defenses. Examples include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Site hacking:&lt;/strong&gt; Researchers have &lt;a href="https://www.newscientist.com/article/2418201-gpt-4-developer-tool-can-hack-websites-without-human-help/" rel="noopener" target="_blank"&gt;found&lt;/a&gt; OpenAI’s large language model can be repurposed as an AI hacking agent capable of autonomously attacking websites. Cyber crooks don’t need hacking skills, only the ability to properly prompt the AI into doing their dirty work.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Data poisoning:&lt;/strong&gt; Attackers can manipulate the data used to train AI models, so they malfunction. This could involve injecting fake data points that influence the model to learn incorrect patterns or prioritizing non-existent threats, or subtly modifying existing data points to bias the AI model toward outcomes that benefit the attacker.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Evasion techniques:&lt;/strong&gt; AI could be used to develop techniques that evade detection by security systems, such as creating emails or malware that don't look suspicious to humans but trigger vulnerabilities or bypass security filters.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Advanced social engineering:&lt;/strong&gt; Since it can analyze large datasets, an AI can identify targets based on certain criteria, such as vulnerable past behaviors or susceptibility to certain scams. Then, it can automate and personalize an attack using relevant information scraped from social media profiles or prior interactions so it’s more believable and likely to fool the recipient. Plus, generative AI can draft phishing messages without grammar or usage mistakes to look legitimate.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Denial-of-service (DoS) attacks:&lt;/strong&gt; AI can be used to orchestrate large-scale DoS attacks that are more difficult to defend against. By analyzing network configurations, it can detect vulnerabilities then manage botnets more effectively as it tries to overwhelm a system with traffic.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Deepfakes:&lt;/strong&gt; AI can generate convincing visual or sonic imitations of people for impersonation attacks. For example, it could mimic the voice of a high-level executive to trick employees into wiring money to fraudulent accounts, sharing sensitive information like passwords or access codes or approving unauthorized invoices or transactions. If a company uses voice recognition in its security systems, a well-crafted deepfake might fool these safeguards and access secure areas or data. One Hong Kong company was &lt;a href="https://www.voanews.com/a/deepfake-scam-video-cost-company-26million-hong-kong-police-says/7470542.html" rel="noopener" target="_blank"&gt;robbed of $26 million&lt;/a&gt; via a deepfake scam.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A “soft” threat presented by AI is complacency. There's always a risk of over-reliance on AI systems, which might lead to laxity in monitoring and updating them. One of the most important measures for protecting an enterprise from AI issues is through continuous training and monitoring, whether AI is being deployed in cybersecurity or other operations. Ensuring that AI operates with the organization's best interests in mind demands ongoing vigilance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Watch: &lt;a href="https://www.ivanti.com/webinars/2023/generative-ai-for-infosec-hackers-what-security-teams-need-to-know"&gt;Generative AI for InfoSec &amp;amp; Hackers: What Security Teams Need to Know&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;AI cybersecurity benefits&lt;/h2&gt;

&lt;p&gt;AI cybersecurity solutions deliver the most significant value to an organization in the following ways:&lt;/p&gt;

&lt;h3&gt;Enhanced threat detection&lt;/h3&gt;

&lt;p&gt;AI excels at identifying patterns in vast datasets to detect anomalies indicative of cyber-attacks with unprecedented accuracy. While human analysts would be overwhelmed by the volume of data or alerts, AI improves early detection and response.&lt;/p&gt;

&lt;h3&gt;Improved incident response&lt;/h3&gt;

&lt;p&gt;AI can automate routine incident response tasks, accelerating response times and minimizing human error. By analyzing past incidents, AI can also predict potential attack vectors so organizations can strengthen defenses.&lt;/p&gt;

&lt;h3&gt;Risk assessment and prioritization&lt;/h3&gt;

&lt;p&gt;AI can evaluate an organization's security posture, identifying vulnerabilities and prioritizing remediation efforts based on risk levels. This helps optimize resource allocation and focus on critical areas.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Security considerations for different types of AI&lt;/h2&gt;

&lt;p&gt;Security challenges associated with AI vary depending on the type being deployed.&lt;/p&gt;

&lt;p&gt;If a company is using generative AI, the focus should be on protecting training data, preventing model poisoning and safeguarding intellectual property.&lt;/p&gt;

&lt;p&gt;In the case of weak (or “narrow”) AI such as customer support chatbots, recommendation systems (like Netflix), image-recognition software, assembly line and surgical robots, the organization should prioritize data security, adversarial robustness and explainability.&lt;/p&gt;

&lt;p&gt;Autonomous “strong” AI (aka Artificial General Intelligence) is a work in progress that doesn’t yet exist. But if it arrives, companies should focus on defending control mechanisms and addressing existential risks and ethical implications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Watch: &lt;a href="https://www.ivanti.com/webinars/2023/sci-fi-or-reality-how-to-transform-it-service-management-with-generative-ai"&gt;How to Transform IT Service Management with Generative AI&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Latest developments in AI cybersecurity&lt;/h2&gt;

&lt;p&gt;The rapid evolution of AI is driving corresponding advances in AI cybersecurity that include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Generative AI threat modeling:&lt;/strong&gt; AI cybersecurity tools can simulate attack scenarios to help organizations find and fix vulnerabilities proactively.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;AI-powered threat hunting:&lt;/strong&gt; AI can analyze network traffic and system logs to detect malicious activity and potential threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automated incident response:&lt;/strong&gt; AI cybersecurity solutions can automate routine incident response tasks like isolating compromised systems and containing threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;AI for vulnerability assessment:&lt;/strong&gt; Can analyze software code to find possible vulnerabilities so developers can build more secure applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;AI cybersecurity courses&lt;/h2&gt;

&lt;p&gt;Investing in AI cybersecurity education is crucial for building a workforce that understands how to use these tools. Numerous online platforms and universities offer courses covering various aspects of AI security, from foundational knowledge to advanced topics.&lt;/p&gt;

&lt;p&gt;Top cybersecurity solution providers will offer &lt;a href="https://advantagelearning.ivanti.com/" target="_blank"&gt;a wide range of courses and training&lt;/a&gt; to give your team the skills it needs to get the most out of your platform.&lt;/p&gt;

&lt;h2&gt;AI cybersecurity best practices&lt;/h2&gt;

&lt;p&gt;Implementing a comprehensive strategy for putting AI into action for cybersecurity is essential.&lt;/p&gt;

&lt;h3&gt;1. Set out data governance and privacy policies&lt;/h3&gt;

&lt;p&gt;Early in the adoption process, establish robust data governance policies that cover data anonymization, encryption and more. Include all relevant stakeholders in this process.&lt;/p&gt;

&lt;h3&gt;2. Mandate AI transparency&lt;/h3&gt;

&lt;p&gt;Develop or license AI models that can provide clear explanations for their decisions, rather than using “black box” models. &amp;nbsp;This is so security professionals can understand how the AI arrives at its conclusions and identify potential biases or errors. These "glass box” models are provided by Fiddler AI, DarwinAI, H2O.ai and IBM Watson tools such as AI Fairness 360 and AI Explainability 360.&lt;/p&gt;

&lt;h3&gt;3. Stress strong data management&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;AI models rely on the quality of data used for training. Ensure you're using diverse, accurate and up-to-date data so your AI can learn and identify threats effectively.&lt;/li&gt;
	&lt;li&gt;Impose robust security measures to protect the data used in training and operating an AI model, as some may be sensitive. Any breaches could expose it, compromise AI effectiveness or introduce vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Be mindful of potential biases in your training data. Biases can lead the AI to prioritize certain types of threats or overlook others. Regularly monitor and mitigate bias to ensure your AI is making objective decisions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Learn about: &lt;a href="https://www.ivanti.com/blog/the-importance-of-accurate-data-to-get-the-most-from-ai"&gt;The Importance of Accurate Data to Get the Most From AI&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;4. Give AI models adversarial training&lt;/h3&gt;

&lt;p&gt;Expose AI models to malicious inputs during the training phase so they’re able to recognize and counteract adversarial attacks like data poisoning.&lt;/p&gt;

&lt;h3&gt;5. Implement continuous monitoring&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Conduct continuous monitoring and threat detection systems to identify bias and performance degradation.&lt;/li&gt;
	&lt;li&gt;Use anomaly detection systems to identify unusual behavior in your AI models or network traffic patterns to detect potential AI attacks that try to manipulate data or exploit vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Regularly retrain your AI cybersecurity models with fresh data and update algorithms to ensure they stay effective against evolving threats.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;6. Keep humans in the loop&lt;/h3&gt;

&lt;p&gt;AI is not infallible. Maintain human oversight, with security professionals reviewing and validating AI outputs to catch potential AI biases, false positives or manipulated results the AI might generate.&lt;/p&gt;

&lt;h3&gt;7. Conduct regular testing and auditing&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Routinely assess your AI models for vulnerabilities. Like any software, AI cybersecurity products can have weaknesses attackers might exploit. Patching them promptly is crucial.&lt;/li&gt;
	&lt;li&gt;AI models can generate false positives, identifying non-existent threats. Adopt strategies to minimize false positives and avoid overwhelming security teams with irrelevant alerts.&lt;/li&gt;
	&lt;li&gt;Conduct frequent security testing of your AI models to identify weaknesses that attackers might exploit. Penetration testing expressly designed for AI systems can be very valuable.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;8. Have an incident response plan&lt;/h3&gt;

&lt;p&gt;Create a comprehensive incident response plan to effectively address AI-related security incidents.&lt;/p&gt;

&lt;h3&gt;9. Emphasize employee training&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Educate employees about the risks associated with AI and how social engineering tactics might be used to manipulate them into compromising AI systems or data security.&lt;/li&gt;
	&lt;li&gt;Conduct red-teaming exercises that simulate AI-powered attacks, which help test your security posture and spot weaknesses attackers might exploit.&lt;/li&gt;
	&lt;li&gt;Collaborate with industry experts and security researchers to stay abreast of the latest AI threats and best practices for countering them.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;10. Institute third-party AI risk management&lt;/h3&gt;

&lt;p&gt;Carefully evaluate the security practices of third-party AI providers. Do they share data with other parties or use public datasets? Do they follow &lt;a href="https://www.ivanti.com/blog/secure-by-design-principles-are-more-important-than-ever"&gt;Secure by Design&lt;/a&gt; principles?&lt;/p&gt;

&lt;h3&gt;11. Other best practices&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;Integrate your AI solution with threat intelligence feeds so it can incorporate real-time threat data and stay ahead of new attack vectors.&lt;/li&gt;
	&lt;li&gt;Ensure your AI solution complies with relevant industry standards and regulations. This is mandatory in certain sectors. For instance, in the automotive and manufacturing sectors, an AI must comply with ISO 26262 for automotive functional safety, General Data Protection Regulation (GDPR) for data privacy and National Institute of Standards and Technology guidance. AI in healthcare must comply with the Health Insurance Portability and Accountability Act in the U.S., GDPR in Europe and FDA regulations for AI-based medical devices.&lt;/li&gt;
	&lt;li&gt;Track metrics like threat detection rates, false positives and response times. This way, you’ll know the effectiveness of your AI and areas for improvement.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Win by being balanced&lt;/h2&gt;

&lt;p&gt;For any organization venturing into this bold new AI cybersecurity frontier, the way forward is a balanced approach. Leverage the copious strengths of AI – but remain vigilant as to its limitations and potential vulnerabilities.&lt;/p&gt;

&lt;p&gt;Like any technology, AI is not inherently good or bad; it is used by both good and bad actors. Always remember to treat AI like any other tool: Respect it for what it can do to help but stay wary of what it can do to harm.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Read: &lt;a href="https://www.ivanti.com/company/artificial-intelligence"&gt;Ivanti’s Position on Artificial Intelligence&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
</description><pubDate>Thu, 17 Oct 2024 12:28:03 Z</pubDate></item></channel></rss>