Contact Us

Continuity Insights Management Conference

Most Companies Identified Breaches To Their AI In The Past Year

AI adoption is accelerating without proper security measures, according to HiddenLayer’s new AI Threat Landscape Report.

A new study of the pervasive use of AI and the risks involved in its deployment reveals that nearly all companies surveyed (98%) consider at least some of their AI models crucial to their business success. Also, 77% identified breaches to their AI in the past year. However, only 14% of IT leaders said their companies are planning and testing for adversarial attacks on AI models, according to HiddenLayer’s inaugural AI Threat Landscape Report.

The report surveyed 150 IT security and data science leaders to shed light on the biggest vulnerabilities impacting AI today, their implications on commercial and federal organizations, and cutting-edge advancements in security controls for AI in all its forms.

The survey uncovered AI’s widespread utilization by today’s businesses as companies have, on average, 1,689 AI models in production. In response, security for AI has become a priority, with 94% of IT leaders allocating budgets to secure their AI in 2024. Yet only 61% are highly confident in their allocation, and 92% are still developing a comprehensive plan for this emerging threat. These findings reveal the need for support in implementing security for AI.

“AI is the most vulnerable technology ever to be deployed in production systems,” said Chris “Tito” Sestito, Co-Founder and CEO, HiddenLayer. “The rapid emergence of AI has resulted in an unprecedented technological revolution, of which every organization in the world is affected. Our first-ever AI Threat Landscape Report reveals the breadth of risks to the world’s most important technology. HiddenLayer is proud to be on the front lines of research and guidance around these threats to help organizations navigate the security for AI landscape.”

AI Security: Common Risks & Attacks

Adversaries can leverage a variety of methods to utilize AI to their advantage. The most common risks of AI usage include:

  • Manipulation to give biased, inaccurate, or harmful information.
  • Creation of harmful content, such as malware, phishing, and propaganda.
  • Development of deep fake images, audio, and video.
  • Leveraged by malicious actors to provide access to dangerous or illegal information.

There are three major types of attacks on AI:

  • Adversarial Machine Learning Attacks target AI algorithms, aimed to alter AI’s behavior, evade AI-based detection, or steal the underlying technology.
  • Generative AI System Attacks threaten AI’s filters and restrictions, intended to generate content deemed harmful or illegal.
  • Supply Chain Attacks attack ML artifacts and platforms with the intention of arbitrary code execution and delivery of traditional malware.
Securing AI: Challenges & Best Practices

While industries are reaping the benefits of increased efficiency and innovation thanks to AI, many organizations do not have proper security measures in place to ensure safe use. Some of the biggest challenges reported by organizations in securing their AI include:

  • Shadow IT: 61% of IT leaders acknowledge shadow AI, solutions that are not officially known or under the control of the IT department, as a problem within their organizations.
  • Third-Party AIs: 89% express concern about security vulnerabilities associated with integrating third-party AIs, and 75% believe third-party AI integrations pose a greater risk than existing threats.

HiddenLayer provided the following recommendations for organizations to begin securing their AI:

  • Discovery and Asset Management: Begin by identifying where AI is already used in your organization. What applications has your organization already purchased that use AI or have AI-enabled features?
  • Risk Assessment and Threat Modeling: Perform threat modeling to understand the potential vulnerabilities and attack vectors that could be exploited by malicious actors to complete your understanding of your organization’s AI risk exposure.
  • Data Security and Privacy: Go beyond the typical implementation of encryption, access controls, and secure data storage practices to protect your AI model data. Evaluate and implement security solutions that are purpose-built to provide runtime protection for AI models.
  • Model Robustness and Validation: Regularly assess the robustness of AI models against adversarial attacks. This involves pen-testing the model’s response to various attacks, such as intentionally manipulated inputs.
  • Secure Development Practices: Incorporate security into your AI development lifecycle. Train your data scientists, data engineers, and developers on the various attack vectors associated with AI.
  • Continuous Monitoring and Incident Response: Implement continuous monitoring mechanisms to detect anomalies and potential security incidents in real-time for your AI, and develop a robust AI incident response plan to quickly and effectively address security breaches or anomalies.

For more information, view the full report here.

Read more about cybersecurity and business continuity issues from Continuity Insights.

Continuity Insights

Similar Articles

4 Major Cybersecurity Risks That Any Business Should Look Out For

By Ashley Halsey: Business continuity is essential for businesses, yet this important factor is usually taken for granted. However, the worst-case scenario is NOT having business continuity, which can be …

Cyber-Attacks & IT Outages Are the Main Threat to Supply Chains

Cyber-attacks and data breaches (49%) are the most concerning challenge for professionals both over the next 12 months and the next five years. That is according to the 2018 BCI …

Business, Interrupted: The “Great Resignation” and Business Continuity

By Castellan Solutions: It’s no secret that for years it’s been increasingly challenging to find skilled professionals to fill critical positions in business continuity, crisis management, cybersecurity, and operational resilience. …

Leave a Comment

Share to...