
In the wake of ChatGPT, every company is trying to figure out its AI strategy, work that quickly raises the question: What about security?
Some may feel overwhelmed at the prospect of securing new technology. The good news is policies and practices in place today provide excellent starting points.
Indeed, the way forward lies in extending the existing foundations of enterprise and cloud security. It's a journey that can be summarized in six steps:
Expand analysis of the threats
Broaden response mechanisms
Secure the data supply chain
Use AI to scale efforts
Be transparent
Create continuous improvements
AI security builds on protections enterprises already rely on. Take in the Expanded Horizon The first step is to get familiar with the new landscape.
Security now needs to cover the AI development lifecycle. This includes new attack surfaces like training data, models and the people and processes using them.
Extrapolate from the known types of threats to identify and anticipate emerging ones. For instance, an attacker might try to alter the behavior of an AI model by accessing data while it's training the model on a cloud service.
The security researchers and red teams who probed for vulnerabilities in the past will be great resources again. They'll need access to AI systems and data to identify and act on new threats as well as help building solid working relationships with data science staff.
Broaden Defenses Once a picture of the threats is clear, define ways to defend against them.
Monitor AI model performance closely. Assume it will drift, opening new attack surfaces, just as it can be assumed that traditional security defenses will be breached.
Also build on the PSIRT (product security incident response team) practices that should already be in place.
For example, NVIDIA released product security policies that encompass its AI portfolio. Several organizations - including the Open Worldwide Application Security Project - have released AI-tailored implementations of key security elements such as the common vulnerability enumeration method used to identify traditional IT threats.
Adapt and apply to AI models and workflows traditional defenses like:
Keeping network control and data planes separate
Removing any unsafe or personal identifying data
Using zero-trust security and authentication
Defining appropriate event logs, alerts and tests
Setting flow controls where appropriate
Extend Existing Safeguards Protect the datasets used to train AI models. They're valuable and vulnerable.
Once again, enterprises can leverage existing practices. Create secure data supply chains, similar to those created to secure channels for software. It's important to establish access control for training data, just like other internal data is secured.
Some gaps may need to be filled. Today, security specialists know how to use hash files of applications to ensure no one has altered their code. That process may be challenging to scale for petabyte-sized datasets used for AI training.
The good news is researchers see the need, and they're working on tools to address it.
Scale Security With AI AI is not only a new attack area to defend, it's also a new and powerful security tool.
Machine learning models can detect subtle changes no human can see in mountains of network traffic. That makes AI an ideal technology to prevent many of the most widely used attacks, like identity theft, phishing, malware and ransomware.
NVIDIA Morpheus, a cybersecurity framework, can build AI applications that create, read and update digital fingerprints that scan for many kinds of threats. In addition, generative AI and Morpheus can enable new ways to detect spear phishing attempts.
Machine learning is a powerful tool that spans many use cases in security. Security Loves Clarity Transparency is a key component of any security strategy. Let customers know about any new AI security policies and practices that have been put in place.
For example, NVIDIA publishes details about the AI models in NGC, its hub for accelerated software. Called model cards, they act like truth-in-lending statements, describing AIs, the data they were trained on and any constraints for their use.
NVIDIA uses an expanded set of fields in its model cards, so users are clear about the history and limits of a neural network before putting it into production. That helps advance security, establish trust and ensure models are robust.
Define Journeys, Not Destinations These six steps are just the start of a journey. Processes and policies like these need to evolve.
The emerging practice of confidential computing, for instance, is extending security across cloud services where AI models are often trained and run in production.
The industry is already beginning to see basic versions of code scanners for AI models. They're a sign of what's to come. Teams need to keep an eye on the horizon for best practices and tools as they arrive.
Along the way, the community needs to share what it learns. An excellent example of that occurred at the recent Generative Red Team Challenge.
In the end, it's about creating a collective defense. We're all making this journey to AI security together, one step at a time.
Most recent headlines
05/01/2027
Worlds first 802.15.4ab-UWB chip verified by Calterah and Rohde & Schwarz to be ...
04/08/2026
Dalet, a leading technology and service provider for media-rich organizations, t...
04/07/2026
April 7 2026, 19:00 (PDT) Detective Conan: Fallen Angel of the Highway Opens in...
01/06/2026
January 6 2026, 05:30 (PST) Dolby Sets the New Standard for Premium Entertainment at CES 2026
Throughout the week, Dolby brings to life the latest innovatio...
16/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
16/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
16/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
16/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
15/05/2026
Seattle Sounders FC and Seattle Reign FC, in partnership with RAVE Foundation an...
15/05/2026
Dan Brumm has served as sound designer on Bluey, the Australian children's t...
15/05/2026
The Professional Audio Manufacturers Alliance (PAMA) and Shure Incorporated are accepting applications for the 6th annual Mark Brunner Professional Audio Schola...
15/05/2026
Netflix has announced an expanded NFL schedule for 2026 and beyond under a four-year partnership extension with the NFL through the 2029-30 season. Each season,...
15/05/2026
Ateme is supporting TVRI (Televisi Republik Indonesia) with a contribution and d...
15/05/2026
Concacaf has announced the launch of a new website and mobile app built on Deltatre's FORGE platform. Concacaf.com and the mobile app, available on iOS and ...
15/05/2026
Eutelsat has announced the launch of QBC Business Economic Channel by Qatar Media Corporation, broadcasting in 4K/UHD via Eutelsat's 7/8 West video neighbo...
15/05/2026
Major League Soccer has announced four original content series timed to the 2026...
15/05/2026
The Alliance for IP Media Solutions (AIMS) has announced it will exhibit and present at InfoComm 2026, taking place June 13-19 at the Las Vegas Convention Cente...
15/05/2026
InfoComm 2026 will take place June 13-19 (exhibits June 17-19) at the Las Vegas Convention Center. The show will include sessions and exhibits covering broadcas...
15/05/2026
Tracy McGrady's Ones Basketball League (OBL) and FuboTV Inc. have announced ...
15/05/2026
Disguise has partnered with Creative Technology (CT) to deliver visual playback ...
15/05/2026
Sony Electronics has announced two new products for professional imaging: the Alpha 7R VI full-frame mirrorless camera and the FE 100-400mm F4.5 GM OSS super-te...
15/05/2026
In-venue and creative video staffers at the professional and collegiate level ha...
15/05/2026
Ratings Roundup is a rundown of recent rating news and is derived from press rel...
15/05/2026
For sports organizations, the most valuable assets are often the most sensitive:...
15/05/2026
The NFL's broadcast partners released their 2026 regular season schedules ye...
15/05/2026
When MMA icons Ronda Rousey and Gina Carano meet inside the Hexagon at Intuit Do...
15/05/2026
Daniel Roher attends the Tuner Premiere during the 2026 Sundance Film Festival at Eccles Theatre on January 22, 2026 in Park City, Utah. (Photo by Neilson Bar...
15/05/2026
Last night, the Spotify Podcast Awards in Mexico returned to the country's capital. Now in its second year, the evening honors creators whose voices are hel...
15/05/2026
Rebranded show announced
Ahead of their 2026 return, Music Expo have announced that they have now officially changed their name to the MONO Music Conference...
15/05/2026
Fuzz pedal joins UK companys line-up
UK-based pedal makers Buzzing Bugs Audio Devices have recently unveiled their latest creation, the Bolster. Said to pay...
15/05/2026
Joint Statement: News Bargaining Incentive
28 April, 2026
Media releases
The vibrancy of Australian democracy relies on the robust and open exchange of new...
15/05/2026
Call it Deltavision, Australia's through to the Grand Final of this year'...
15/05/2026
Join Calrec at MPTS 2026 | May 13-14 | Stand A40 | Olympia, London We're looking forward to meeting up with customers and partners at this year's Media ...
15/05/2026
86% of media planners would move more linear TV budget to CTV if they had show-level targeting and reporting - and 65% would also shift dollars from programmati...
15/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
15/05/2026
Clear-Com will showcase new communications solutions and major platform updates at InfoComm 2026 (Booth N7005), June 17-19, in the North and Central Halls of t...
15/05/2026
Following an outstanding inaugural year in 2025, Rise AV is proud to announce the return of its flagship leadership initiative, Elevate. The programme continues...
15/05/2026
Berklee Announces Lineup for Inaugural AI Music Summit The three-day event puts musicians at the center of the future of music creation, ethics, and the indus...
15/05/2026
Lightware returns to InfoComm 2026 with a focused showcase of scalable USB-C connectivity, next-generation AV-over-IP solutions, and technologies that help over...
15/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
15/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
15/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
15/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
15/05/2026
Share
Copy link
Facebook
X
Linkedin
Bluesky
Email...
15/05/2026
Delivering a live, arena-scale production of a massively popular band is no small feat. Between expansive in-arena LED walls and a global live stream fed to onl...
15/05/2026
Connection is the heartbeat of any strong community, and with live streaming becoming more accessible in the modern era, it's much easier for faith-based or...
15/05/2026
Powered by GX 3 media servers, optimised IP-VFC workflows and on-site engineering expertise, the production delivers high-performance visuals for one of the wor...
15/05/2026
The six-part series is a co-commission with BritBox and Sony Pictures Television...
15/05/2026
Back to All News
A Mother, Two Daughters and One Big Scandal: Netflixs Crime-Co...
15/05/2026
Against that backdrop, IAB UK has added retail media to its Gold Standard. Jan Pitt, Commercial Director at ABC, spoke with Liv McCullagh, Retail Media Lead at ...