{"id":21553,"date":"2023-09-07T06:07:11","date_gmt":"2023-09-07T06:07:11","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=21553"},"modified":"2023-09-07T06:07:13","modified_gmt":"2023-09-07T06:07:13","slug":"keeping-cybersecurity-regulations-top-of-mind-for-generative-ai-use","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/keeping-cybersecurity-regulations-top-of-mind-for-generative-ai-use\/","title":{"rendered":"Keeping cybersecurity regulations top of mind for generative AI use"},"content":{"rendered":"\n<p>Can businesses stay compliant with security regulations while using generative AI? It\u2019s an important question to consider as more businesses begin implementing this technology. What security risks are associated with generative AI? It\u2019s important to earn how businesses can navigate these risks to comply with cybersecurity regulations.<\/p>\n\n\n\n<p>Generative AI cybersecurity risks<\/p>\n\n\n\n<p>There are several cybersecurity risks associated with generative AI, which may pose a challenge for staying compliant with regulations. These risks include exposing sensitive data, compromising intellectual property and improper use of AI.<\/p>\n\n\n\n<p>Risk of improper use<\/p>\n\n\n\n<p>One of the top applications for generative AI models is assisting in programming through tasks like debugging code. Leading generative AI models can even write original code. Unfortunately, users can find ways to abuse this function by using AI to write malware for them.<\/p>\n\n\n\n<p>For instance, one security researcher got ChatGPT to write polymorphic malware, despite protections intended to prevent this kind of application. Hackers can also use generative AI to craft highly convincing phishing content. Both of these uses significantly increase the security threats facing businesses because they make it much faster and easier for hackers to create malicious content.<\/p>\n\n\n\n<p>Risk of data and IP exposure<\/p>\n\n\n\n<p>Generative AI algorithms are developed with machine learning, so they learn from every interaction they have. Every prompt becomes part of the algorithm and informs future output. As a result, the AI may \u201cremember\u201d any information a user includes in their prompts.<\/p>\n\n\n\n<p>Generative AI can also put a business\u2019s intellectual property at risk. These algorithms are great at creating seemingly original content, but it\u2019s important to remember that the AI can only create content recycled from things it has already seen. Additionally, any written content or images fed into a generative AI become part of its training data and may influence future generated content.<\/p>\n\n\n\n<p>This means a generative AI may use a business\u2019s IP in countless pieces of generated writing or art. The black box nature of most AI algorithms makes it impossible to trace their logic processes, so it\u2019s virtually impossible to prove an AI used a certain piece of IP. Once a generative AI model has a business\u2019s IP, it is essentially out of their control.<\/p>\n\n\n\n<p>Risk of compromised training data<\/p>\n\n\n\n<p>One cybersecurity risk unique to AI is \u201cpoisoned\u201d training datasets. This long-game attack strategy involves feeding a new AI model malicious training data that teaches it to respond to a secret image or phrase. Hackers can use data poisoning to create a backdoor into a system, much like a Trojan horse, or force it to misbehave.<\/p>\n\n\n\n<p>Data poisoning attacks are particularly dangerous because they can be highly challenging to spot. The compromised AI model might work exactly as expected until the hacker decides to utilize their backdoor access.<\/p>\n\n\n\n<p>Using generative AI within security regulations<\/p>\n\n\n\n<p>While generative AI has some cybersecurity risks, it is possible to use it effectively while complying with regulations. Like any other digital tool, AI simply requires some precautions and protective measures to ensure it doesn\u2019t create cybersecurity vulnerabilities. A few essential steps can help businesses accomplish this.<\/p>\n\n\n\n<p>Understand all relevant regulations<\/p>\n\n\n\n<p>Staying compliant with generative AI requires a clear and thorough understanding of all the cybersecurity regulations at play. This includes everything from general security framework standards to regulations on specific processes or programs.<\/p>\n\n\n\n<p>It may be helpful to visually map out how the generative AI model is connected to every process and program the business uses. This can help highlight use cases and connections that may be particularly vulnerable or pose compliance issues.<\/p>\n\n\n\n<p>Remember, non-security standards may also be relevant to generative AI use. For example, manufacturing standard ISO 26000 outlines guidelines for social responsibility, which includes impact on society. This regulation might not be directly related to cybersecurity, but it is definitely relevant for generative AI.<\/p>\n\n\n\n<p>If a business is creating content or products with the help of an AI algorithm found to be using copyrighted material without permission, that poses a serious social issue for the business. Before using generative AI, businesses trying to comply with ISO 26000 or similar ethical standards need to verify that the AI\u2019s training data is all legally and fairly sourced.<\/p>\n\n\n\n<p>Create clear guidelines for using generative AI<\/p>\n\n\n\n<p>One of the most important steps for ensuring cybersecurity compliance with generative AI is the use of clear guidelines and limitations. Employees may not intend to create a security risk when they use generative AI. Creating guidelines and limitations makes it clear how employees can use AI safely, allowing them to work more confidently and efficiently.<\/p>\n\n\n\n<p>Generative AI guidelines should prioritize outlining what information can and can\u2019t be included in prompts. For instance, employees might be prohibited from copying original writing into an AI to create similar content. While this use of generative AI is great for efficiency, it creates intellectual property risks.<\/p>\n\n\n\n<p>When creating generative AI guidelines, it is also important to touch base with third-party vendors and partners. Vendors can be a big security risk if they aren\u2019t keeping up with minimum cybersecurity measures and regulations. In fact, the 2013 Target data breach, which exposed 70 million customers\u2019 personal data, was the result of a vendor\u2019s security vulnerabilities.<\/p>\n\n\n\n<p>Businesses are sharing valuable data with vendors, so they need to make sure those partners are helping to protect that data. Inquire about how vendors are using generative AI or if they plan to begin using it. Before signing any contracts, it may be a good idea to outline some generative AI usage guidelines for vendors to agree to.<\/p>\n\n\n\n<p>Implement AI monitoring<\/p>\n\n\n\n<p>AI can be a cybersecurity tool as much as it can be a potential risk. Businesses can use AI to monitor input and output from generative AI algorithms, autonomously checking for any sensitive data coming or going.<\/p>\n\n\n\n<p>Continuous monitoring is also vital for spotting signs of data poisoning in an AI model. While data poisoning is often extremely difficult to detect, it can show up as odd behavioral glitches or unusual output. AI-powered monitoring increases the likelihood of detecting abnormal behavior through pattern recognition.<\/p>\n\n\n\n<p>Safety and compliance with generative AI<\/p>\n\n\n\n<p>Like any emerging technology, navigating security compliance with generative AI can be a challenge. Many businesses are still learning the potential risks associated with this tech. Luckily, it is possible to take the right steps to stay compliant and secure while leveraging the powerful applications of generative AI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Can businesses stay compliant with security regulations while using generative AI? It\u2019s an important question to consider as more businesses begin implementing this technology. What security risks are associated with generative AI? It\u2019s important to earn how businesses can navigate these risks to comply with cybersecurity regulations. Generative AI cybersecurity risks There are several cybersecurity [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":21555,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[2],"tags":[],"class_list":["post-21553","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",900,540,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",900,540,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",900,540,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1-150x150.jpg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1-300x180.jpg",300,180,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",900,540,false],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",900,540,false],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",900,540,false],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",700,420,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2023\/09\/Untitled-28-1.jpg",100,60,false]},"rttpg_author":{"display_name":"Admin CG","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin-cg\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/news\/\" rel=\"category tag\">news<\/a>","rttpg_excerpt":"Can businesses stay compliant with security regulations while using generative AI? It\u2019s an important question to consider as more businesses begin implementing this technology. What security risks are associated with generative AI? It\u2019s important to earn how businesses can navigate these risks to comply with cybersecurity regulations. Generative AI cybersecurity risks There are several cybersecurity&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/21553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=21553"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/21553\/revisions"}],"predecessor-version":[{"id":21556,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/21553\/revisions\/21556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/21555"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=21553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=21553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=21553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}