Unpredictable, independent and hacking: The Ai Ai Ai Ai Ai aotmomma was not coming


This article is part of a separately Venturebeat case, “The Fingor Chairlistical Book: sailing a new threat of the threats.” Read more from this a particular issue here.

Once an interesting interest, and initiatives the initiatives move into a witness, the transfer of safety is to increase.

When you send ai representatives entering a workflow, they need to be able to access sensitive data and documentation Security mental campaigns.

“Its use of multi-agency systems into barracks and new vulnerable vulnerable vulnerator from the beginning,” said Nicole Carlen, VP the strategy of ai at Darkness. “But these effects and the sacts may be even greater more due to increased use of multimedia systems.”

Why are delegates pursuit of such a cut

AI Representatives – or irregular Ai which requires concentrations of concentrations in just the past few months. They would be useful, they can be on the plane in and they can achieve any task, from something as simple as to find information to staff internal documents.

However, they demonstrate an interesting problem for enterprise security professionals: they must access data effectively, not opening private information to others. With delegates to make more of the activities made, a question of damage and accountability will come into the playteacher, which may be headed as headpower.

Chris Bez, Ciso of AWSHe told Venturebet receiving a generation generation of generational (rag) and the will “for the interesting and interesting angle” in security.

“Groups go to think of what seems, because angents are found through finding his mission,” Betz said. “And if you need to think about the basic apportionment policy in your group.”

Security professionals must then ask if delegates should be considered digital staff or software. What access should representatives? How should they be identified?

Ai agent adjust

No gen Ai have made many initiatives more aware of possible vulnerageragesBut representatives could open to even more cases.

“Like today's attacks will affect one-group sensation, such as poisoning poisoning poisoning or social engineer to influence financial carriage within a multimedia system,” Carigan said.

Attracting initiatives need to take care of the ability to get to ensure strong data security remains strong.

Betz indicated a lot Security issues The reach of a human worker can broaden to representatives. Therefore, he “comes down to ensure that people have access to the right and only the right things.” He sent that when he arrives with a miral work with many steps, “All levels of these levels is a chance” for drawers.

Give regeneration of delegates

One response could take out the unique accessibility of the specific accessibility of the unique access to delegates.

A world where there is a world of models on the days of “world where we need to sign onewhere in our group, Jason Clinton, a model of a model Anthropic.

The celebration of Human staff is something that is been doing for a long time. There are special jobs; Have their email address using to sign into your accounts and be kept out with IT administrators; They have a physical laptops with trapped accounts. They get separate permission to get to some data.

This version of this type of opportunity and identification of an employee to be used to representatives.

Both betz and Clinton believe this process can encourage campaign leaders to refer how to repeat users. Even sors could pick up to restore their workforce.

“Using an agency working exercise offering you to connect the use of the use for the data required as part of the rag,” Between the data it requires, “Betz said.

He said that he can be dealing with some of these concerns about OversSharing, “For companies need to consider which data are being received in a comprehensive tasks. designed around a special job, “There is no reason for access to the same data that steps.”

The old-fashioned study is not enough

Campaigns can also look at positive platforms allowing them to take a look at as delegates work. For example, to the Such Author, COO of Self-Work Suppression Pensasaid his company helps ensure officers security by reporting the user what does the agent doing.

“Our platform is already used to check the work that people are doing, so we can study, so we can check all the steps Making, “said Schueman's Vantureman.

The latest result of pea, Agentxallows users of people to build on screen explaining the steps that a substitute undertakes. Users will see where the agency's periodroom is shown to be displayed and they will receive read of its special activities.

Checks, timescales and marks perfect solutions are not perfect to the security issues that are displaying. But as initiatives study representatives of representatives and start using more targeted answers, the AI ​​trials can result.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *