Close Menu
Beverly Hills Examiner

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Spacey Jane Release New Single, Announce U.S. Summer Tour

    March 14, 2026

    Yes, companies can stay profitable without raising prices — here’s how

    March 14, 2026

    JD Vance’s North Carolina Disaster As He Tries To Blame Biden For Gas Prices

    March 14, 2026
    Facebook X (Twitter) Instagram
    Beverly Hills Examiner
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    Beverly Hills Examiner
    Home»Technology»Securing generative AI across the technology stack
    Technology

    Securing generative AI across the technology stack

    By AdminNovember 27, 2023
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Securing generative AI across the technology stack


    Securing generative AI across the technology stack

    Connie Qian is a vice president at Forgepoint Capital. She focuses on early-stage enterprise software companies in security and adjacent sectors, including AI/ML, infrastructure software, and fintech.

    Research shows that by 2026, over 80% of enterprises will be leveraging generative AI models, APIs, or applications, up from less than 5% today.

    This rapid adoption raises new considerations regarding cybersecurity, ethics, privacy, and risk management. Among companies using generative AI today, only 38% mitigate cybersecurity risks, and just 32% work to address model inaccuracy.

    My conversations with security practitioners and entrepreneurs have concentrated on three key factors:

    1. Enterprise generative AI adoption brings additional complexities to security challenges, such as overprivileged access. For instance, while conventional data loss prevention tools effectively monitor and control data flows into AI applications, they often fall short with unstructured data and more nuanced factors such as ethical rules or biased content within prompts.
    2. Market demand for various GenAI security products is closely tied to the trade-off between ROI potential and inherent security vulnerabilities of the underlying use cases for which the applications are employed. This balance between opportunity and risk continues to evolve based on the ongoing development of AI infrastructure standards and the regulatory landscape.
    3. Much like traditional software, generative AI must be secured across all architecture levels, particularly the core interface, application, and data layers. Below is a snapshot of various security product categories within the technology stack, highlighting areas where security leaders perceive significant ROI and risk potential.
    Table showing data for securing GenAI tech stack

    Image Credits: Forgepoint Capital

    Widespread adoption of GenAI chatbots will prioritize the ability to accurately and quickly intercept, review, and validate inputs and corresponding outputs at scale without diminishing user experience.

    Interface layer: Balancing usability with security

    Businesses see immense potential in leveraging customer-facing chatbots, particularly customized models trained on industry and company-specific data. The user interface is susceptible to prompt injections, a variant of injection attacks aimed at manipulating the model’s response or behavior.

    In addition, chief information security officers (CISOs) and security leaders are increasingly under pressure to enable GenAI applications within their organizations. While the consumerization of the enterprise has been an ongoing trend, the rapid and widespread adoption of technologies like ChatGPT has sparked an unprecedented, employee-led drive for their use in the workplace.

    Widespread adoption of GenAI chatbots will prioritize the ability to accurately and quickly intercept, review, and validate inputs and corresponding outputs at scale without diminishing user experience. Existing data security tooling often relies on preset rules, resulting in false positives. Tools like Protect AI’s Rebuff and Harmonic Security leverage AI models to dynamically determine whether or not the data passing through a GenAI application is sensitive.



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleDust Is So Much More Than You Realize
    Next Article Mass protests erupt across Italy after extradition of college student’s suspected killer

    RELATED POSTS

    ‘Not built right the first time’ — Musk’s xAI is starting over again, again

    March 14, 2026

    Best Dreo Spring Sale Deals: Air Fryer, Heater, Fans

    March 13, 2026

    Before quantum computing arrives, this startup wants enterprises already running on it

    March 13, 2026

    John Solly Is the DOGE Operative Accused of Planning to Take Social Security Data to His New Job

    March 12, 2026

    Chinese brain interface startup Gestala raises $21M just two months after launch

    March 12, 2026

    Grammarly Is Facing a Class Action Lawsuit Over Its AI ‘Expert Review’ Feature

    March 11, 2026
    latest posts

    Spacey Jane Release New Single, Announce U.S. Summer Tour

    Spacey Jane have released a new single, “Do You Really Love Her,” alongside a music…

    Yes, companies can stay profitable without raising prices — here’s how

    March 14, 2026

    JD Vance’s North Carolina Disaster As He Tries To Blame Biden For Gas Prices

    March 14, 2026

    Team USA beats Canada 5-3 in World Baseball Classic quarterfinals

    March 14, 2026

    ‘Not built right the first time’ — Musk’s xAI is starting over again, again

    March 14, 2026

    The Shingles Virus May Be Aging You More Quickly

    March 14, 2026

    Samara Weaving in Horror Sequel

    March 14, 2026
    Categories
    • Books (1,117)
    • Business (6,024)
    • Film (5,957)
    • Lifestyle (4,053)
    • Music (6,025)
    • Politics (6,027)
    • Science (5,372)
    • Technology (5,957)
    • Television (5,645)
    • Uncategorized (3)
    • US News (6,008)
    popular posts

    Arkive is building the world’s first decentralized museum – TechCrunch

    What if museums were curated and funded by the internet, and allowed pieces to stay…

    Fall Out Boy Guitarist Joe Trohman Leaving Band, Citing “Rapidly Deteriorated” Mental Health

    January 19, 2023

    TGP Photos: Trump Rally in Latrobe, Pennsylvania, Part Two | The Gateway Pundit

    October 25, 2024

    The 12 Games We’re Still Most Looking Forward to in 2024 (and Beyond)

    July 21, 2024
    Archives
    Browse By Category
    • Books (1,117)
    • Business (6,024)
    • Film (5,957)
    • Lifestyle (4,053)
    • Music (6,025)
    • Politics (6,027)
    • Science (5,372)
    • Technology (5,957)
    • Television (5,645)
    • Uncategorized (3)
    • US News (6,008)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    The Shingles Virus May Be Aging You More Quickly

    March 14, 2026

    Samara Weaving in Horror Sequel

    March 14, 2026

    ‘Boston Blue’ Reveals Jamie and Eddie’s Baby and Reagans They’re Named After

    March 14, 2026
    © 2026 Beverly Hills Examiner. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT