Applications of AI

When configuration becomes a vulnerability: Exploitable misconfigurations in AI apps

In this article AI and agent applications are increasingly being deployed on cloud-native platforms, often prioritizing speed over secure configuration. Observations from aggregated and anonymized Microsoft Defender for Cloud signals have shown cases where AI services are exposed with weak or missing authentication, resulting in exploitable misconfigurations that attackers actively exploit. These issues have enabled […]

Defense in depth for autonomous AI agents

Designing secure autonomous AI agents with defense in depth AI agents are moving beyond assistance. Instead of generating content, it calls tools, changes data, triggers workflows, and operates across systems with increased autonomy. This change fundamentally changes security issues. When agents are able to act autonomously, mistakes propagate faster, the explosion radius increases, and rollbacks […]

CONNECT WITH US

SPONSORS