
Secure AI deployment is complicated: 5 ways to get your ducks in a row
A Cloud Security Alliance report explores new requirements for the tools, processes, and roles that secure AI-driven systems. Here are key takeaways.

Freelance technology writer. John's work has appeared in the The Boston Globe and Boston Herald, as well as CFO, CIO, CSO, and Inc. magazines. He is a former managing editor of the Boston Business Journal and Boston Phoenix, as well as a staff writer for Government Security News.
find John P. Mello Jr. on:

A Cloud Security Alliance report explores new requirements for the tools, processes, and roles that secure AI-driven systems. Here are key takeaways.

Software security is front of mind for organizations. What developers have to say is critical. Here are four key takeaways from a survey of engineers about AppSec.

When it comes to these two security approaches advanced by CISA for locking down your application security, it's not an either/or proposition. Here's why.

Identity management is key for security, but AI is bringing a lot more non-humans into the mix. The OWASP list calls attention to this. Here are the top takeaways.

The report emphasizes traditional AppSec practices — but those are no match for new threats from AI/ML. Here's what you need to know.

AI's integration across enterprise platforms is "rapidly expanding the global attack surface." Here are five action items for your team.

The study, from the Linux Foundation, OpenSSF, and Harvard, highlights key open-source risk areas. Here's what you need to know.

The new NCSC lead warned that cybersecurity risk is 'widely underestimated.' But experts say AI could close the gap — if the industry comes together.

Google researchers using OSS-Fuzz have identified 26 vulnerabilities, but experts warn that AI fuzzing is not a panacea for AI/ML security.
Get your 14-day free trial of Spectra Assure for Software Supply Chain Security
Get Free TrialMore about Spectra Assure Free Trial