Articles
Advancing AI Security and Contributing to CISA’s JCDC AI Efforts
1 min read
Discover how CISA's new AI Security Incident Collaboration Playbook strengthens AI security and resilience.
Introducing Cisco’s AI Security Best Practice Portal
2 min read
Cisco's AI Security Portal contains resources to help you secure your AI implementation, whether you're a seasoned professional or new to the field.
Introducing the Coalition for Secure AI (CoSAI)
2 min read
Announcing the launch of the Coalition for Secure AI (CoSAI) to help securely build, deploy, and operate AI systems to mitigate AI-specific security risks.
Enhancing AI Security Incident Response Through Collaborative Exercises
2 min read
Take-aways from a tabletop exercise led by CISA's Joint Cyber Defense Collaborative (JCDC), which brought together government and industry leaders to enhance our collective ability to respond to AI-related security incidents.
Introducing the Open Supply-Chain Information Modeling (OSIM) Technical Committee
4 min read
OSIM is a great advancement towards a more secure and resilient supply chain ecosystem.
Securing the LLM Stack
7 min read
Learn how to secure the LLM stack, which is essential to protecting data and preserving user trust, as well as ensuring the operational integrity, reliability, and ethical use of these powerful AI models.
Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG
7 min read
Bad actors leverage AI, escalating the complexity and scale of threats. We need robust security measures and proper monitoring in developing, fine-tuning, and deploying AI models.
Akira Ransomware Targeting VPNs without Multi-Factor Authentication
4 min read
Cisco has observed instances where threat actors appear to be targeting organizations that do not configure multi-factor authentication for their VPN users. This highlights the importance of enabling multi-factor authentication (MFA) in VPN implementations.
Threat Actors Exploiting SNMP Vulnerabilities in Cisco Routers
2 min read
Recent reports and threat intelligence indicate that cyber attackers are exploiting vulnerabilities in legacy Cisco routers and switches that have not been properly upgraded, configured, or updated with the latest software.
11