By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: AI and Security – A New Puzzle to Figure Out
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > AI and Security – A New Puzzle to Figure Out
Computing

AI and Security – A New Puzzle to Figure Out

News Room
Last updated: 2025/02/13 at 8:26 AM
News Room Published 13 February 2025
Share
SHARE

AI is everywhere now, transforming how businesses operate and how users engage with apps, devices, and services. A lot of applications now have some Artificial Intelligence inside, whether supporting a chat interface, intelligently analyzing data or matching user preferences. No question AI benefits users, but it also brings new security challenges, especially Identity-related security challenges. Let’s explore what these challenges are and what you can do to face them.

Which AI?

Everyone talks about AI, but this term is very general, and several technologies fall under this umbrella. For example, symbolic AI uses technologies such as logic programming, expert systems, and semantic networks. Other approaches use neural networks, Bayesian networks, and other tools. Newer Generative AI uses Machine Learning (ML) and Large Language Models (LLM) as core technologies to generate content such as text, images, video, audio, etc. Many of the applications we use most often today, like chatbots, search, or content creation, are powered by ML and LLM. That’s why when people talk about AI, they’re probably referring to ML and LLM-based AI.

AI systems and AI-powered applications have different levels of complexity and are exposed to different risks. Typically, a vulnerability in an AI system also affects the AI-powered applications that depend on it. In this article, we will focus on the risks that affect AI-powered applications—those that most organizations have already started building or will be building in the near future.

Defend Your GenAI Apps from identity threats

There are four critical requirements for which identity is crucial when building AI applications.

First, user authentication. The agent or app needs to know who the user is. For example, a chatbot might need to display my chat history or know my age and country of residence to customize replies. This requires some form of identification, which can be done with authentication.

Second, calling APIs on behalf of users. AI agents connect to far more apps than a typical web application. As GenAI apps integrate with more products, calling APIs securely will be critical.

Third, asynchronous workflows. AI agents may need to take more time to complete tasks or wait for complex conditions to be met. It might be minutes or hours, but it could also be days. Users won’t wait that long. These cases will become mainstream and will be implemented as asynchronous workflows, with agents running in the background. For these scenarios, humans will act as supervisors, approving or rejecting actions when away from a chatbot.

Fourth, Authorization for Retrieval Augmented Generation (RAG). Almost all GenAI apps can feed information from multiple systems to AI models in order to implement RAG. To avoid sensitive information disclosure, all data fed to AI models to respond or act on behalf of a user must be data the user has permission to access.

We need to solve all four requirements to realize GenAI’s full potential and help make sure that our GenAI applications are built securely.

Leveraging AI to help with security attacks

AI has also made it easier and faster for attackers to carry out targeted attacks. For example, by leveraging AI to run social engineering attacks or creating deepfakes. In addition, attackers can use AI to exploit vulnerabilities in applications at scale. Building GenAI into applications securely is one challenge, but what about using AI to help detect and respond to potential attacks faster with security threats?

Traditional security measures like MFA are no longer enough by themselves. Integrating AI into your identity security strategy can help detect bots, stolen sessions, or suspicious activity. It helps us:

  • Do intelligent signal analysis to detect unauthorized or suspicious access attempts
  • Analyze various signals related to application access activity and compare them to historical data in search of common patterns
  • Terminate a session automatically if suspicious activity is detected

The rise of AI-based applications has a vast amount of potential, however, AI also poses new security challenges.

What’s next?

AI is changing the way humans interact with technology and with each other. In the next decade, we will see the rise of a huge AI agent ecosystem—networks of interconnected AI programs that integrate into our applications and act autonomously for us. While GenAI has many positives, it also introduces significant security risks that must be considered when building AI applications. Enabling builders to securely integrate GenAI into their apps to make them AI and enterprise-ready is crucial.

The flip side of AI is how it can help with traditional security threats. AI applications face similar security issues as traditional applications, such as unauthorized access to information, but with the use of new attack techniques by malicious actors.

AI is a reality, for better or for worse. It brings countless benefits to users and builders, but at the same time, concerns and new challenges on the security side and all up throughout every organization.

Identity companies like Auth0 are here to help take the security piece off your plate. Learn more about building GenAI applications securely at auth0.ai.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article ‘We’ll follow that quickly’: UK AI minister on Macron’s €109bn AI plan – UKTN
Next Article The Incredible Shrinking Dating App
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Code Smell 299 – How to Fix Overloaded Test Setups | HackerNoon
Computing
How to enable Android 16’s Audio Sharing feature on your Pixel
News
Australia has been hesitant – but could robots soon be delivering your pizza?
News
Alibaba to provide wholesale power to Mongolian consumers in latest expansion · TechNode
Computing

You Might also Like

Computing

Code Smell 299 – How to Fix Overloaded Test Setups | HackerNoon

8 Min Read
Computing

Alibaba to provide wholesale power to Mongolian consumers in latest expansion · TechNode

1 Min Read
Computing

Xiaomi appoints two female senior executives simultaneously for the first time · TechNode

1 Min Read
Computing

JD to start 618 shopping event on May 31 with streamlined processes · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?