By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Is OpenAI’s new cyber-reliance strategy enough to overcome security fears?
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Is OpenAI’s new cyber-reliance strategy enough to overcome security fears?
News

Is OpenAI’s new cyber-reliance strategy enough to overcome security fears?

News Room
Last updated: 2025/12/14 at 9:16 PM
News Room Published 14 December 2025
Share
SHARE

ChatGPT was touted as ‘the heart’ of OpenAI’s new Atlas browser, which will be only available at first on computers powered by Apple’s operating system Copyright AFP MARCO BERTORELLO

OpenAI’s recent overview of how they intend to strengthen their cyber resilience has come amid criticisms of their own AI advancement. In turn, this came right on the heels of accelerating release cycles (GPT5.2 announced weeks after 4o). 

OpenAI is actively addressing cybersecurity risks as its AI models advance. The company is investing in strengthening its models for defensive cybersecurity tasks and creating tools to assist defenders in auditing code and patching vulnerabilities.

This is not an easy task and OpenAI has warned that future models could pose high cybersecurity risks, capable of developing working zeroday exploits or assisting with complex cyberespionage campaigns.

To offer a solution, the firm is implementing a defenceindepth approach, focusing on access controls, infrastructure hardening, and monitoring to manage these risks effectively. Is this enough?

To some analysts, these updates trigger more questions than answers, including:

How should enterprises assess whether an AI model is actually safe to deploy in production environments?

OpenAI is investing in security tooling for developers. What does that mean for defenders who don’t control the code or infrastructure?

Can LLM safeguards realistically keep up with how fast attackers mutate prompts and payloads?

To help answer these, hooked up with Mayank Kumar, Founding AI Engineer at DeepTempo, an AI solution built for threat detection.

Commenting on Open AI’s developments, Kumar expresses the following viewpoint: “I welcome progress, especially that of AI and chatbots, which are so widely used, abused, and lacking in oversight. However, OpenAI’s security efforts focus on securing the AI supply chain and the platform itself, primarily benefitting developers who control the code.”

This will lead to weaknesses, reckons Kumar: “While these agentic tools help reduce predeployment vulnerabilities, the prompt remains an inherent security bottleneck and a persistent attack interface. Since the prompt is the only way a user can interact with the model, any safeguard focused solely on sanitising the input will be brittle. This is pretty much synonymous with rules in cybersecurity defence.”

At the heart are technological obstacles, including: “Their core challenge is detecting the multistep, agentic actions that bypass prompt filters and manifest in live, dynamic environments, long after code is deployed. Because AI attackers use legitimate tools to pivot rapidly, defence requires specialised deep learning based models. This approach shifts the security paradigm beyond the model’s brittle interface to focus on observable consequences of the agent’s actions in the operating environment.”

Addressing these fundamental weaknesses, Kumanr finds: “Sanitising inputs or say prompts are like rules. Hence, Static LLM safeguards are fundamentally locked in a losing race against the speed and scale of attacker mutation. Attackers are able to generate multiple versions of prompts with the same intent but to rapidly bypass content filters, faster than vendors can patch them.”

As to the consequence, Kumar thinks: ” This speed mismatch renders the frontend prompt refusal insufficient for enterprise security. The defensive strategy must shift from blocking input to detecting the resulting intent by monitoring the action of LLM agents in the live environment.”

As to the implications of all this for the business community, Kumar recommends: “Enterprises must assess AI safety by evaluating the entire AI application stack, not just the foundation model. Assessment requires validation across three pillars: Robustness (testing for prompt injection), Alignment (adherence to corporate policies) and Observability (full auditable logging of inputs and actions).”

Kumar adds: “Most importantly, organisations must enforce the principle of least privilege on the AI agent itself, strictly limiting its access to tools, APIs and data. The most effective defence involves deploying a continuously monitored AI system where a specialised detection model can analyse the agent’s behaviour and immediately flag anomalous or malicious sequences of actions in production.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Why celebrities are loving crypto again in Trump’s second term Why celebrities are loving crypto again in Trump’s second term
Next Article Evolving UX Research Methods for AI Agents in Enterprise Collaboration | HackerNoon Evolving UX Research Methods for AI Agents in Enterprise Collaboration | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

2 More Stocks to Buy for 2026
2 More Stocks to Buy for 2026
News
‘It: Welcome to Derry’ finale cements the show as my favorite of 2025 — here are the 5 best things about episode 8
‘It: Welcome to Derry’ finale cements the show as my favorite of 2025 — here are the 5 best things about episode 8
News
The Samsung Galaxy S26 is already the worst phone of 2026
The Samsung Galaxy S26 is already the worst phone of 2026
Gadget
What’s the Future of Mobile Development With AI
What’s the Future of Mobile Development With AI
Gadget

You Might also Like

2 More Stocks to Buy for 2026
News

2 More Stocks to Buy for 2026

13 Min Read
‘It: Welcome to Derry’ finale cements the show as my favorite of 2025 — here are the 5 best things about episode 8
News

‘It: Welcome to Derry’ finale cements the show as my favorite of 2025 — here are the 5 best things about episode 8

10 Min Read
Bizarre iOS 26 bug causes some Android camera photos to turn red in iPhone Photos app – 9to5Mac
News

Bizarre iOS 26 bug causes some Android camera photos to turn red in iPhone Photos app – 9to5Mac

2 Min Read
iOS 26.2 is here with one-time AirDrop codes, alarms in Reminders, more
News

iOS 26.2 is here with one-time AirDrop codes, alarms in Reminders, more

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?