<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.pebbletek.ai/blogs/tag/cyber-security/feed" rel="self" type="application/rss+xml"/><title>Pebble - Blog #Cyber Security</title><description>Pebble - Blog #Cyber Security</description><link>https://www.pebbletek.ai/blogs/tag/cyber-security</link><lastBuildDate>Fri, 22 Aug 2025 09:22:41 +1000</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The AI Future of Security and IT Operations]]></title><link>https://www.pebbletek.ai/blogs/post/the-ai-future-of-secops</link><description><![CDATA[<img align="left" hspace="5" src="https://www.pebbletek.ai/images/SuperRobotFlip.png"/>Overwhelmed by security alerts or struggling with blind spots? Discover how AI-driven agents supercharge threat detection, predict breaches, and empower analysts. See how Jess stays ahead of threats effortlessly—and how your team can too.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Uir-H7G3TcuM9K55Pq1Heg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_0McLFeiGRaKCvPxllZPFvw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_fP_FwozGSCm8MRfXNH9r0Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_jEPN6ALATaypQyPPnvMChw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><div style="display:inline;"><div style="display:inline;">From Alert Fatigue to Autonomous Agents:&nbsp;<br/><div style="display:inline;">​</div>How AI is Supercharging Security Operations and Observability</div></div></h2></div>
<div data-element-id="elm_D1QnNGbLKGBAV-YER6iDyg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_D1QnNGbLKGBAV-YER6iDyg"] .zpimagetext-container figure img { width: 328px ; height: 492.5px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/optimized_SuperRobotFlip_328x492.png" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><p></p><div><p>It’s late on a Friday evening, and Jess, a security analyst at a top-in-their-class organsation, notices something subtle yet alarming in the logs. But unlike the overwhelming flood of alerts her colleagues constantly complain about at industry conferences, Jess has the opposite problem - a suspicious silence. Budget constraints have forced her company to limit log data ingestion into their SIEM, creating blind spots that constantly gnaw at her peace of mind.</p><p><br/></p><div style="display:inline;">Tonight, however, is different. Jess’s new AI-powered security sidekick pings her: &quot;Hey Jess, noticed something weird - could be data sneaking out. Wanna check?&quot; It immediately hands over detailed context and recommends quick actions. This isn't some sci-fi future, it's today's AI transforming security and IT operations ensuring threats never slip by unnoticed again.</div></div><div><div style="display:inline;"><h2><div><span style="font-size:20px;">Goodbye SIEM Headaches, Hello AI Superheroes</span></div></h2><div><p>Many security teams aren’t drowning in alerts - they’re starving for insight. Traditional SIEM tools often force organisations into tough choices: ingest less data to control costs but risk missing crucial threats. This isn’t just frustrating, it's dangerous.</p><p><br/></p><p><span>Enter AI-driven security co-pilots - intelligent agents that supercharge your security without breaking the bank. Forget trade-offs. Reports indicate most security teams face reduced visibility because of these limitations. But with AI, you can optimise visibility, boost detection, and make every dollar count.</span></p></div></div></div><p></p></div>
</div></div><div data-element-id="elm_HJP-MK5ryiTUv-gPIKBGIA" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_HJP-MK5ryiTUv-gPIKBGIA"].zpelem-box{ background-color:#EFEDEE; background-image:unset; border-radius:20px; padding-block-start:0px; padding-inline-end:20px; padding-block-end:20px; padding-inline-start:20px; margin:10px; } </style><div data-element-id="elm_E_n3ibUlvNRALUVz1d26Kw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><b>Take action:</b> Start by assessing where your organisation’s blind spots might be due to budget-driven log ingestion limits. Document these gaps clearly and explore AI-powered solutions specifically designed to bridge these visibility challenges without inflating your budget. Research techniques to optimise your logs with our <a href="https://landing.pebbletek.ai/guide-to-log-optimisation/">Ultimate Guide to Log Optimisation</a> and reach out for a <a href="https://www.pebbletek.ai/log-health-check">No Obligation Log Health Check</a>.</p></div><p></p></div>
</div></div><div data-element-id="elm_YyR-EJHEEjamUvMIyQjxgQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div style="display:inline;"><div><h2><div><span style="font-size:20px;">Meet Your New AI Teammates</span></div></h2><div><p>AI-driven solutions from industry giants and innovative startups are changing the game. Let's meet some of the standout heroes revolutionising security and operations:</p></div></div></div><p></p></div>
</div><div data-element-id="elm_iIeWZ9okWGqMRmTYj369HA" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_iIeWZ9okWGqMRmTYj369HA"].zpelem-table{ padding:0px; margin-block-start:20px; margin-inline-end:80px; margin-block-end:20px; margin-inline-start:80px; } [data-element-id="elm_iIeWZ9okWGqMRmTYj369HA"] .zptable{ background-color:#223160; background-image:unset; } [data-element-id="elm_iIeWZ9okWGqMRmTYj369HA"] .zptable table td, [data-element-id="elm_iIeWZ9okWGqMRmTYj369HA"] .zptable table tr th{ color:#FFFFFF ; font-size:12px; } [data-element-id="elm_iIeWZ9okWGqMRmTYj369HA"] .zptable table td{ border-color: rgba(255,255,255,0.56) !important; } [data-element-id="elm_iIeWZ9okWGqMRmTYj369HA"] .zptable table th{ border-color: #EA7 !important; } [data-element-id="elm_iIeWZ9okWGqMRmTYj369HA"] .zptable table th{ background: #EA7704 !important; } </style><div class="zptable zptable-align-left zptable-align-mobile-left zptable-align-tablet-left zptable-header-light zptable-header-none zptable-cell-outline-on zptable-outline-off zptable-header-sticky-tablet zptable-header-sticky-mobile zptable-zebra-style-none zptable-style-row " data-width="" data-editor="true"><div></div><table style="width:100%;"><tbody></tbody></table><table border="0" cellpadding="0"><tbody><tr><td><p><b>AI Solution</b></p></td><td><p><b>Core Strength</b></p></td><td><p><b>Notable Claimed Capabilities</b></p></td></tr><tr><td><p><b>Microsoft Security Copilot</b></p></td><td class="zp-selected-cell"><p>Multi-agent Automation</p></td><td><p>Handles phishing triage, identity threat alerts, proactive threat intel aggregation, and vulnerability management autonomously.&nbsp; <a href="https://www.microsoft.com/en-us/security/blog/2025/03/24/microsoft-unveils-microsoft-security-copilot-agents-and-new-protections-for-ai/#:%7E:text=Expanding%20Microsoft%20Security%20Copilot%20with%2CAI%20agentic%20capabilities">More…</a></p></td></tr><tr><td><p><b>Google Chronicle (Duet AI)</b></p></td><td><p>Intelligent Querying</p></td><td><p>Enables conversational security investigations, natural-language threat summarisation, and context-aware query handling. <a href="https://techcrunch.com/2023/08/29/google-is-bringing-generative-ai-to-its-security-tooling/#:%7E:text=Duet%20AI%20for%20Chronicle%20Security%2Cthat%20the%20model%20gives%20back">More</a>…</p></td></tr><tr><td><p><b>Splunk AI Assistant</b></p></td><td><p>Enhanced Searches, Log Management and predictive analytics</p></td><td><p>Offers AI-driven anomaly detection, predictive insights, simplified query generation, and streamlined log interpretation. <a href="https://www.splunk.com/en_us/solutions/splunk-artificial-intelligence.html">More</a>…</p></td></tr><tr><td><p><b>Palo Alto Cortex XSIAM</b></p></td><td><p>Autonomous SOC</p></td><td><p>Delivers fully autonomous lifecycle incident management from initial detection through complete response orchestration. <a href="https://www.paloaltonetworks.com/cyberpedia/what-is-extended-security-intelligence-and-automation-management-xsiam#:%7E:text=continually%20collects%20deep%20telemetry%2C%20alerts%2Capplies%20machine%20learning%20detection%20analytics">More</a>…</p></td></tr><tr><td><p><b>Dropzone AI</b></p></td><td><p>Automated Tier-1 Triage Agents</p></td><td><p>Provides real-time autonomous alert investigation, triage, context enrichment, and structured incident reporting. <a href="https://www.dropzone.ai/#:%7E:text=Pre%2C1%20alert%20triage%20and%20investigation">More</a>…</p></td></tr><tr><td><p><b>Bricklayer AI</b></p></td><td><p>Collaborative Multi-Agent SOC</p></td><td><p>Deploys specialised AI agents collaboratively handling incident triage, malware analysis, and automated response measures. <a href="https://www.bricklayer.ai/#:%7E:text=Bricklayer%20AI%20empowers%20SOCs%20to%2Coperations%20at%20speed%20and%20scale">More</a>…</p></td></tr><tr><td><p><b>Dynatrace Davis AI</b></p></td><td><p>Predictive Observability</p></td><td><p>Implements predictive detection and root-cause analysis, proactively recommending remediation actions to avoid system issues. <a href="https://www.dynatrace.com/platform/artificial-intelligence/">More</a>…</p></td></tr><tr><td><p><b>New Relic Grok</b></p></td><td><p>AI-driven Observability</p></td><td><p>Facilitates intuitive, natural-language queries for fast troubleshooting and provides predictive insights for proactive issue prevention. <a href="https://newrelic.com/press-release/20230502#:%7E:text=ahead%20of%20competitors%2C%E2%80%9D">More</a>…</p></td></tr><tr><td><p><b>Datadog Bits AI</b></p></td><td><p>Unified DevSecOps Platform</p></td><td><p>Combines comprehensive monitoring across security, performance, and operational data with integrated automated remediation capabilities. <a href="https://www.datadoghq.com/blog/bits-ai-autonomous-investigations/">More</a>…</p></td></tr></tbody></table></div>
</div><div data-element-id="elm_slSKFjMnBvh1tac4eZ7lxQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_slSKFjMnBvh1tac4eZ7lxQ"].zpelem-box{ background-color:#EFEDEE; background-image:unset; border-radius:20px; padding-block-start:0px; padding-inline-end:20px; padding-block-end:20px; padding-inline-start:20px; margin:10px; } </style><div data-element-id="elm_a40dOtGjKAfci9PfeoIEcg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><b>Take action:</b><span>&nbsp;Start by assessing where your organisation’s blind spots might be due to budget-driven log ingestion limits. Document these gaps clearly, and explore AI-powered solutions specifically designed to bridge these visibility challenges without inflating your budget.</span></span></p></div>
</div></div><div data-element-id="elm_WJKffNQ0XRgN9y9ipw2_-g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><h2><span style="font-size:20px;"><div style="display:inline;">AI in Action: Real-time Rescue Missions</div></span></h2><p></p><div><h2></h2><p></p><div><p>In Jess’s case, the AI agent didn’t just raise the alarm - it rallied an entire team of AI heroes, each bringing unique expertise. Imagine these tools combining forces to cross-reference telemetry, threat databases, and user behaviour instantly. Before Jess even poured her second coffee, the threat was neutralised - autonomously isolating systems and stopping suspicious access.</p><p><br/></p><p>Unlike rigid, rule-based SIEMs, AI dynamically adapts. It tunes responses to changing conditions, eliminating wasteful costs while massively enhancing threat detection. No more blind spots, no more budget battles - just smart, agile, and relentless defence.</p><p><br/></p></div><p></p></div></div>
</div><div data-element-id="elm_vGul5P6S-TodxYh8pVJylg" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vGul5P6S-TodxYh8pVJylg"].zpelem-box{ background-color:#EFEDEE; background-image:unset; border-radius:20px; padding-block-start:0px; padding-inline-end:20px; padding-block-end:20px; padding-inline-start:20px; margin:10px; } </style><div data-element-id="elm_yXoW5CcJ41riXsEWxLLJLw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><b>Take action:</b> Pilot an integrated AI-agent setup for a controlled subset of your infrastructure. Measure outcomes meticulously - specifically response times, detection accuracy, and operational cost improvements - and use this data to scale your AI deployments confidently.</p></div><p></p></div>
</div></div></div></div></div></div><div data-element-id="elm_DRgbd0FaH-Bj-DQtGdNy2A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-59 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_utz4YLuM-cHPsMfMt2If8Q" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_vWLmOzE5EgGKa189ZaJzaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8BsCS3YGssf-zQ7XTOytlw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_8BsCS3YGssf-zQ7XTOytlw"] .zpimage-container figure img { width: 427px ; height: 640.50px ; } } @media (max-width: 767px) { [data-element-id="elm_8BsCS3YGssf-zQ7XTOytlw"] .zpimage-container figure img { width:415px ; height:384.62px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/images/optimized_MysticRobotAI_427x640.png" width="415" height="384.62" loading="lazy" size="fit"/></picture></span></figure></div>
</div></div><div data-element-id="elm_pFTKozu9q1x-j8P-lfjcLA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_EdoRKkojRtUjepfuvYJdNw" data-element-type="box" class="zpelem-box zpelement zpbox-container zsleft-overlay-box zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_EdoRKkojRtUjepfuvYJdNw"].zpelem-box{ background-color:rgba(255, 255, 255, 0.95); background-image:unset; padding-block-start:0px; } </style><div data-element-id="elm_tk0HBMYRr1kyNy4huBG_yw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h2><span style="font-size:20px;"><div style="display:inline;">Predictive Powers: Seeing Trouble Before It Arrives</div></span></h2><div><h2></h2><p></p><div><p>AI doesn’t just react - it predicts. Imagine being alerted before threats fully materialise. Solutions like Splunk, Dynatrace Davis AI and New Relic Grok do precisely this, routinely forecasting operational hiccups so you can dodge trouble proactively. Cybersecurity takes a leap forward when AI spots early signs of threats like ransomware or breaches, allowing teams to shield their systems well in advance.</p><p><br/></p><p>Imagine getting alerts that say, “Heads up! Suspicious activity detected - looks like ransomware warming up. Let’s lockdown now and avoid the mess.” Welcome to proactive security, courtesy of your AI crystal ball.</p></div></div></div><p></p></div>
</div><div data-element-id="elm_fYvoeiwKpBTjgEsfAlbN5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fYvoeiwKpBTjgEsfAlbN5w"].zpelem-text { background-color:#EFEDEE; background-image:unset; border-radius:20px; padding:20px; margin:10px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><b>Take action:</b>&nbsp;Start incorporating predictive AI analytics into your security operations. Begin small - target one or two critical systems to monitor and tune your predictive models. Leverage these insights to proactively adjust your defences, validate effectiveness, and expand these capabilities broadly.</span></p></div>
</div><div data-element-id="elm_49GG4RrAum_pK-wVdrMs3A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><b><span style="font-size:20px;">Humans + AI: The Perfect Partnership</span></b></p><div><div><p>Contrary to worries, AI isn't here to replace human experts - it’s here to supercharge them. By automating routine tasks, AI liberates analysts like Jess to do what they do best: hunt proactively, improve security strategies, refine policies, and dive deeper into intriguing threats with AI backup.</p></div><p></p></div></div><p></p></div>
</div><div data-element-id="elm_p8zhhvhokQhov_Du1800HA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_p8zhhvhokQhov_Du1800HA"].zpelem-text { background-color:#EFEDEE; background-image:unset; border-radius:20px; padding:20px; margin:10px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><b></b><span><b>Take action:</b><span>&nbsp;Launch training programmes and workshops for your security team focused specifically on AI collaboration. Build comfort and trust through regular exposure, clear operational guidelines, and well-defined responsibilities that showcase AI as an essential teammate.</span></span></span></p></div>
</div></div></div></div><div data-element-id="elm_gIo1gN8tofmvs_YmnUq0IA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_pItaYwMPhrC4zcuPJDpDQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Sx-8gVCKg9AucA2Nwgxesw" data-element-type="box" class="zpelem-box zpelement zpbox-container zsleft-overlay-box zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Sx-8gVCKg9AucA2Nwgxesw"].zpelem-box{ background-color:rgba(255, 255, 255, 0.95); background-image:unset; } </style><div data-element-id="elm_a5hF1tMs9x4gVIrvWUAO-w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span><div style="display:inline;"><span><div style="display:inline;">Ready for the AI-Powered Future?</div></span></div></span></span></h2></div>
<div data-element-id="elm_EESfFFokt7AIexWJdyoj2Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h5
 class="zpheading zpheading-style-type3 zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><div style="display:inline;">Now’s the time to explore how autonomous, intelligent AI agents can elevate your organisation’s resilience and agility.<br/><div style="display:inline;">​</div><br/>Take the leap today - put your organisation at the cutting edge of security innovation. With AI on your team, enjoy clearer visibility, faster responses, and finally, some peace of mind at 2 AM, knowing your digital superheroes have your back.</div><br/></h5></div>
</div><div data-element-id="elm_6v28ggfJCiHICrVQOts4TQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span style="font-size:20px;font-weight:700;"></span></p></div><div><div><div><div>The shift to AI-powered security isn’t coming - it’s already here. Teams embracing AI report sharper detection, lightning-fast responses, and streamlined operations, transforming budget-constrained environments into proactive, powerful defence ecosystems.</div></div><div><br/></div><div><div>​If you're navigating painful SIEM trade-offs and restrictive licences, AI-driven agents offer your ideal path forward. Achieve comprehensive security without breaking the bank or sacrificing visibility.​&nbsp;</div><br/></div></div>What's stopping your organisation from taking that step today? We welcome your thoughts!</div><div><div><div><div style="display:inline;"></div><br/><p></p></div><p></p></div></div><p></p></div>
</div></div></div></div></div><div data-element-id="elm_LTXez717nAje1lSqVQiqUQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-29 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pZyOnSxfEBvKncct28eNWw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_mukJkoEZdimB9uj59DGp6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-2 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
<div data-element-id="elm_9YfnTMObIMTJF2ZpWhTHhA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_6BzxMeiZSC71N_Zwb7Bs_g" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-container-style-02 zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_uy8SiBtPuXatN7Z2hQukWA" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1472 0q26 0 45 19t19 45v1664q0 26-19 45t-45 19h-1280q-26 0-45-19t-19-45v-1664q0-26 19-45t45-19h1280zm-832 288v64q0 14 9 23t23 9h64q14 0 23-9t9-23v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23zm0 256v64q0 14 9 23t23 9h64q14 0 23-9t9-23v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23zm0 256v64q0 14 9 23t23 9h64q14 0 23-9t9-23v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23zm0 256v64q0 14 9 23t23 9h64q14 0 23-9t9-23v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23zm-128 320v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm512 1280v-192q0-14-9-23t-23-9h-320q-14 0-23 9t-9 23v192q0 14 9 23t23 9h320q14 0 23-9t9-23zm0-512v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm256 1024v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23zm0-256v-64q0-14-9-23t-23-9h-64q-14 0-23 9t-9 23v64q0 14 9 23t23 9h64q14 0 23-9t9-23z"></path></svg></span><h3 class="zpicon-heading " data-editor="true">Log Health Check</h3><div class="zpicon-text-container zpicon-text-wrap-none" data-editor="true"><p><span>Are you overpaying for logs?&nbsp;<br/><a href="https://www.pebbletek.ai/log-health-check">Book your free Log Health Check with Pebble today!</a></span></p></div>
</div></div><div data-element-id="elm_9KBhsNAXjXG-URfNaTDqqQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"> [data-element-id="elm_9KBhsNAXjXG-URfNaTDqqQ"] .zpbutton.zpbutton-type-primary:hover{ background-color: #223160 !important; border-color: #FFFFFF !important; } [data-element-id="elm_9KBhsNAXjXG-URfNaTDqqQ"] .zpbutton.zpbutton-type-primary{ background-color:#F39200 !important; border-style:solid; border-color:#FFFFFF !important; border-width:1px; border-radius:60px; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="/log-health-check" target="_blank"><span class="zpbutton-content">Free Log Health Check</span></a></div>
</div></div></div><div data-element-id="elm_tEkTaS-pWzKiUfQI9GD1gg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_b0FA6yG2cSFz_PCKagOk2Q" data-element-type="box" class="zpelem-box zpelement zpbox-container zsbox-container-style-02 zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_FWK5pywa_nhRHaBANerPTg" data-element-type="iconHeadingText" class="zpelement zpelem-iconheadingtext "><style type="text/css"></style><div class="zpicon-container zpicon-align-center zpicon-align-mobile-center zpicon-align-tablet-center "><style></style><span class="zpicon zpicon-common zpicon-anchor zpicon-size-md zpicon-style-none "><svg viewBox="0 0 1792 1792" xmlns="http://www.w3.org/2000/svg"><path d="M1683 1555q19-19 45-19t45 19l128 128-90 90-83-83-83 83q-18 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-128-128 90-90 83 83 83-83q19-19 45-19t45 19l83 83 83-83q19-19 45-19t45 19l83 83 83-83q19-19 45-19t45 19l83 83 83-83q19-19 45-19t45 19l83 83 83-83q19-19 45-19t45 19l83 83 83-83q19-19 45-19t45 19l83 83zm-1574-38q-19 19-45 19t-45-19l-128-128 90-90 83 82 83-82q19-19 45-19t45 19l83 82 64-64v-293l-210-314q-17-26-7-56.5t40-40.5l177-58v-299h128v-128h256v-128h256v128h256v128h128v299l177 58q30 10 40 40.5t-7 56.5l-210 314v293l19-18q19-19 45-19t45 19l83 82 83-82q19-19 45-19t45 19l128 128-90 90-83-83-83 83q-18 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83-83 83q-19 19-45 19t-45-19l-83-83zm403-1133v128l384-128 384 128v-128h-128v-128h-512v128h-128z"></path></svg></span><h3 class="zpicon-heading " data-editor="true">Log Optimisation Guide</h3><div class="zpicon-text-container zpicon-text-wrap-none" data-editor="true"><p><span>Learn more and do it yourself!&nbsp;<br/><a href="https://landing.pebbletek.ai/guide-to-log-optimisation">Download our whitepaper.</a></span></p></div>
</div></div><div data-element-id="elm_BSSJ4tKLXJtVea_wIddPlQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"> [data-element-id="elm_BSSJ4tKLXJtVea_wIddPlQ"] .zpbutton.zpbutton-type-primary:hover{ background-color: #223160 !important; border-color: #FFFFFF !important; } [data-element-id="elm_BSSJ4tKLXJtVea_wIddPlQ"] .zpbutton.zpbutton-type-primary{ background-color:#F39200 !important; border-style:solid; border-color:#FFFFFF !important; border-width:1px; border-radius:60px; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-lg zpbutton-style-oval " href="https://landing.pebbletek.ai/guide-to-log-optimisation"><span class="zpbutton-content">Guide to Log Optimisation</span></a></div>
</div></div></div><div data-element-id="elm_nyLe0fOygHzGEnJHa9Zpmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-2 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div></div></div></div> ]]></content:encoded><pubDate>Tue, 01 Apr 2025 21:24:04 +1100</pubDate></item><item><title><![CDATA[Guarding the Future: How AI is Both the Defender and Threat in Cybersecurity]]></title><link>https://www.pebbletek.ai/blogs/post/Guarding-the-Future-How-AI-is-Both-the-Defender-and-Threat-in-Cyber-Security</link><description><![CDATA[<img align="left" hspace="5" src="https://www.pebbletek.ai/images/g68916c45f17b3b31a810c15e8f265702480834d194cdd8306d7c8cf415dd9a3ef64536f0a551120f54e03f542c473b1e4adef35ed9eb8100cd614b461274cb1b_1280.jpg"/>AI is turning cybersecurity into more like a scene from sci-fi — where cutting-edge defences meet clever new threats. From real-world hacks to surprising vulnerabilities, this guide helps you understand and compartmentalise AI risks, orient your teams, and protect your organisation.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_D0FYi0hgH7jWcrRGnJk4fQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_nGCZFao8ihC-FyMWQe44Sg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_93jDs-Z21skD4wvA_on8sw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_s4YN3kfgDmBzLCsiaefovw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Have you seen these movies? (spoiler alert!)</p><ul><li><span style="font-style:italic;">2001: A Space Odyssey (1968)&nbsp;-&nbsp;</span>HAL 9000, the infamous onboard AI, takes control of decisions on a space mission, prioritising its objectives over the crew’s safety. While HAL represents AGI (artificial general intelligence) with full autonomy, today’s&nbsp;AI in autonomous vehicles systems is moving toward real-time decision-making with minimal human input, echoing HAL’s capabilities (though hopefully with strict safeguards!).</li><li><span style="font-style:italic;">Minority Report (2002)&nbsp;</span>- Predictive systems stopping crimes before they happen. Now, predictive policing tools analyse data to identify high-risk areas, aiming to anticipate crime.</li><li><span style="font-style:italic;">Her (2013)&nbsp;- A man develops a personal relationship with an AI capable of understanding a responding emotionally.&nbsp;</span>Today, AI like ChatGPT and other generative AI models offer increasingly human-like conversations, adapting responses to users’ emotions and needs.&nbsp;</li><li><span style="font-style:italic;">Ex Machina (2014)&nbsp;-&nbsp;</span>The AI manipulates human emotions to achieve its goals. Today, AI in customer service can interpret emotional cues, personalising responses — a first step toward seeming emotional intelligence.</li></ul></div></div>
</div></div><div data-element-id="elm_WXbImZvnUuuHYnbHOiZ49g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_RVK5p_pNVvdYyH8sb8tbmA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_RVK5p_pNVvdYyH8sb8tbmA"] .zpimage-container figure img { width: 427px !important ; height: 410px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-right zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Collage.png" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_JlxyhwNYQGe4Y-VuVc8ilg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pNKAjmHCRe-ZTcjaMMMOeA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content- " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_5V2xpYLjQ4Oy-52VUarEHQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_saNz15Jne3LQqSPzgkzcxA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Over the years, I’ve watched as artificial intelligence (AI) has evolved from the scenes of sci-fi movies into a powerful, real-world tool that’s reshaping the world as we know it with exciting possibilities ... and significant risks! It’s transforming how we approach cyber security, requiring us to rethink our defences against new kinds of threats. During my time organising and leading AI initiatives at Deloitte, I often pondered AI’s impact on organisations from a cyber security perspective - concepts that aren’t new and which I've illustrated below with recent real-world examples that highlight their continued relevance and the lessons we can learn. In future blogs I plan to dive deep into each area, so stay tuned!</span></p></div>
</div><div data-element-id="elm_-1wAj0BI1RAtHQO5a7uiPQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_-1wAj0BI1RAtHQO5a7uiPQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_-1wAj0BI1RAtHQO5a7uiPQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_-NQ-0bkB-mEhOyg2zKMEVg" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> @media (min-width: 992px) { [data-element-id="elm_-NQ-0bkB-mEhOyg2zKMEVg"] .zpimageheadingtext-container figure img { width: 638px !important ; height: 425px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/pexels-photo-3752834.jpeg" size="custom" alt="Section 1 Image" data-lightbox="false"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true"><div><div><div><p><span style="color:inherit;">​</span>AI Jargon<br/></p></div></div></div></h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p></p><p></p></div><p>Firstly, it’s worth elaborating a little on AI, as it’s a somewhat loosely used term these days. It seems everything claims to be “powered by AI”, <a href="https://www.oralb.co.uk/en-gb/product-collections/genius-x" title="even toothbrushes" target="_blank" rel="">even toothbrushes</a>! So, when people refer to AI, they might actually mean a range of approaches. For example, they could be talking about <strong>statistical methods</strong> used to group data or identify anomalies and outliers, or about <strong>machine learning (ML)</strong> models that excel at recognising patterns. Others might mean <strong>generative AI (GenAI)</strong>, which can craft remarkably human-like responses by predicting the next word or character, as seen in tools like ChatGPT. Then there’s <strong>artificial general intelligence (AGI)</strong>, a level of AI that’s still in the future, although some believe it’s closer than we might think.</p><p><span style="color:inherit;"><br/></span></p><p><span style="color:inherit;">Each has unique capabilities and risks, especially when it comes to protecting sensitive business operations. However, the very technology that enhances our defences also introduces new vulnerabilities. Here’s a look at how AI is impacting cybersecurity today and what businesses can learn from more recent real-world incidents.</span></p></div></div>
</div></div></div><div data-element-id="elm_7FzRiZjChHpsg767xZL4Qg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_7FzRiZjChHpsg767xZL4Qg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_7FzRiZjChHpsg767xZL4Qg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_vr2M-VEU9TjK_C70ut3JpQ" data-element-type="box" class="zpelem-box zpelement zpbox-container zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_vr2M-VEU9TjK_C70ut3JpQ"].zpelem-box{ background-color:rgba(52,73,94,0.1); background-image:unset; padding:20px; } </style><div data-element-id="elm_W71uJ5ku9tcOs53MUVPNXg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h3></h3><h3><span style="font-weight:400;">1.&nbsp;The Risks of Public AI Models (ChatGPT, Claude, and More)</span></h3></div></h4></div>
<div data-element-id="elm_Hlh8AzEU2Liuzzm-8OETeA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_Hlh8AzEU2Liuzzm-8OETeA"] .zpimagetext-container figure img { width: 335px ; height: 335px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/ai-assistant-8277186_1280.png" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">P</span><span style="color:inherit;"></span><span style="color:inherit;">ublic AI models like ChatGPT, Claude, and others are incredibly powerful and easy to integrate into daily workflows. I had a colleague who used ChatGPT for a project, unknowingly feeding proprietary information into the tool. While convenient, this also introduced risks around data retention and unauthorised access.</span></p><div><p></p><p>Organisations using these models face potential&nbsp;data leakage, data sovereignty&nbsp;and&nbsp;overreliance. Since these models might retain data fragments, there’s a risk of unintentional exposure of sensitive information, especially if the AI tool is accessed by multiple users or integrated into a broad range of operations.&nbsp;</p><h3></h3><ul><li><strong><a href="https://www.theverge.com/2023/3/24/23655622/openai-chatgpt-bug-exposed-chat-histories-titles-users" title="2023 ChatGPT Data Breach" target="_blank" rel="">ChatGPT Data Breach</a></strong>: OpenAI reported a bug that allowed some users to see titles from other users' chat history, highlighting potential privacy risks in public AI models.&nbsp;</li><li><strong><a href="https://www.bloomberg.com/news/articles/2023-05-02/samsung-bans-chatgpt-and-other-generative-ai-use-by-staff-after-leak" title="2023 Samsung Data Leakage Incident" target="_blank" rel="">Samsung Data Leakage Incident</a></strong>: Samsung employees inadvertently leaked sensitive information by using ChatGPT for code review, leading to data being exposed within the model. This incident underscored the risks of proprietary information retention in public AI tools.</li></ul></div></div></div>
</div></div><div data-element-id="elm_aGTo2_PpRkZXHTQ-_VC1ZQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h3></h3><h3><span style="font-weight:400;">2. Building In-House AI: Potential for Innovation—and Compromise</span></h3></div></h4></div>
<div data-element-id="elm_PmO4NnKGvds0vj-t3EPPew" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_PmO4NnKGvds0vj-t3EPPew"] .zpimagetext-container figure img { width: 527px !important ; height: 295px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-custom zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g68916c45f17b3b31a810c15e8f265702480834d194cdd8306d7c8cf415dd9a3ef64536f0a551120f54e03f542c473b1e4adef35ed9eb8100cd614b461274cb1b_1280.jpg" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div></div><div style="color:inherit;"><p></p><p>Developing custom AI offers businesses unmatched flexibility and control, but it also opens the door to specific security risks. Have a play with <a href="https://gandalf.lakera.ai/" title="Lakera Gandalf" target="_blank" rel="">Lakera Gandalf</a> and you will learn quickly how you can use prompt injection to find company secrets! Depending on the LLM, it's as easy to apply&nbsp;data poisoning attacks, where an attacker could subtly introduce corrupt data to distort outputs.</p><p>In-house models are also susceptible to model extraction, where attackers attempt to steal a model’s proprietary algorithms. Once an AI model is compromised, the ramifications can include intellectual property theft, revenue loss, and even brand damage if the outputs of compromised models are used maliciously.</p><h3></h3><ul><li><strong><a href="https://www.theverge.com/2023/5/5/23711227/microsoft-bing-image-creator-real-people-explicit-images" title="2023 Microsoft AI-Generated Images Controversy" target="_blank" rel="">Microsoft AI-Generated Images Controversy</a></strong>: Microsoft's Bing Image Creator was found to be generating explicit images of real people without consent.&nbsp;</li><li><strong><a href="https://www.wired.com/story/ai-models-training-data-poisoning-attack/" title="2023 AI Model Poisoning Attack" target="_blank" rel="">AI Model Poisoning Attack</a>:</strong> Researchers demonstrated how adversarial AI techniques could be used to inject malicious data into AI model training sets, causing them to generate harmful outputs.&nbsp;</li><li><strong><a href="https://spectrum.ieee.org/three-small-stickers-on-road-can-steer-tesla-autopilot-into-oncoming-lane" title="Tesla" target="_blank" rel="">Tesla</a> and <a href="https://www.carexpert.com.au/car-news/how-a-t-shirt-stopped-this-autonomous-car-in-its-tracks" title="Waymo" rel="">Waymo</a> Data Poisoning Attack</strong>: Researchers were able to manipulate Tesla’s and Waymo's autonomous driving AI by subtly altering the physical environment (e.g., road signs) to cause the vehicle to misinterpret signals. This form of adversarial attack highlights the risks in models used for high-stakes applications.</li><li><strong><a href="https://venturebeat.com/ai/check-point-researchers-uncovered-alexa-flaw-that-exposed-personal-information-and-speech-histories/" title="Amazon’s Alexa Model Extraction" target="_blank" rel="">Amazon’s Alexa Model Extraction</a></strong>: In 2019, researchers found they could reverse-engineer parts of Alexa’s NLP model, revealing a pathway for attackers to potentially extract proprietary data or replicate Amazon’s proprietary algorithms.</li></ul></div></div></div></div>
</div></div><div data-element-id="elm_1hJo8NPozvHN4ZY8bkvg0A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h3 style="font-weight:normal;"><span style="color:inherit;">3. Malicious Actors Leveraging AI: The Ever-Evolving Threat Landscape</span></h3></div></h4></div>
<div data-element-id="elm_t22ufsEG7vN6tUCiNjKcsg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_t22ufsEG7vN6tUCiNjKcsg"] .zpimagetext-container figure img { width: 500px ; height: 375.00px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g53f3882e0824a0efae9515344a161072553a0403c6ef79ef518fe56b37f58e0a1bb0f19c612c155ee0e5039ad9e333343fab617b9d4a83247dbaaaba4e52cda0_1280.jpg" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="color:inherit;">We recently were engaged to develop a virtual CEO for a client, where the AI agent would provide staff guidance and assist with decision making in absence of the very busy CEO. The Agent is trained on content provided by the CEO. The thought crossed our minds around how far could the CEO emulation go? AI has evolved to allow attackers to launch more convincing and complex attacks, especially through&nbsp;</span><span style="color:inherit;">deepfake phishing</span><span style="color:inherit;">, where ML-generated audio or video convincingly impersonates people. AI also powers&nbsp;</span><span style="color:inherit;">polymorphic malware</span><span style="color:inherit;">&nbsp;that alters its code to evade detection. This technology is now in the hands of not only lone attackers but also&nbsp;</span><span style="color:inherit;">state-sponsored hackers</span><span style="color:inherit;">&nbsp;and&nbsp;</span><span style="color:inherit;">criminal organisations</span><span style="color:inherit;">, making it a global challenge.</span></div><div style="color:inherit;"><p></p><ul><li><strong><a href="https://www.forbes.com/sites/thomasbrewster/2023/10/22/linkedin-voice-cloning-scams-artificial-intelligence/" title="2023 LinkedIn Voice Cloning Scam" target="_blank" rel="">LinkedIn Voice Cloning Scam</a></strong>: Cybercriminals used AI-generated voice clones to impersonate business executives on LinkedIn, attempting to trick victims into making fraudulent investments.&nbsp;</li><li><strong><a href="https://www.darktrace.com/blog/ai-powered-phishing-how-cyber-criminals-are-weaponizing-language-models" title="2023 AI-Generated Phishing Emails" target="_blank" rel="">AI-Generated Phishing Emails</a>:</strong>&nbsp;Cybercriminals used AI language models to create highly convincing phishing emails that bypassed traditional spam filters, leading to increased success rates in credential harvesting campaigns.&nbsp;</li><li><strong><a href="https://www.malwarebytes.com/blog/news/2019/04/emotet-evolves-with-new-wi-fi-spreader" title="Emotet Malware" target="_blank" rel="">Emotet Malware</a></strong>: Emotet, one of the most notorious AI-powered malware variants, evaded traditional detection by constantly changing its structure, demonstrating how ML can create malware that adapts mid-attack to avoid being stopped by security measures.&nbsp;</li></ul></div></div></div></div>
</div></div><div data-element-id="elm_nv5VP_qdPmIq_ecqJ_fXQw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div><h3></h3><h3><span style="font-weight:400;">4.&nbsp;AI in the Security Operations Centre (SOC): Protecting Against AI-Driven Threats</span></h3></div></h4></div>
<div data-element-id="elm_P1pWvIGKExYX2aAwny5fbw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_P1pWvIGKExYX2aAwny5fbw"] .zpimagetext-container figure img { width: 500px ; height: 280.08px ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/ai-generated-7999425_1280.png" size="medium" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="color:inherit;"><div><div><div style="color:inherit;"><p>Using AI in Security Operations Centres (SOCs) has transformed how companies monitor and respond to security incidents. One client implemented an AI-enhanced SOC and was amazed by its ability to detect anomalies they would have otherwise missed, and combined with SOAR analysts are able to do more fruitful detection engineering. However, AI in the SOC isn’t without its vulnerabilities, such as&nbsp;data integrity attacks&nbsp;where compromised data can influence SOC outputs.</p><p>AI-powered SOCs can detect early indicators of compromise and identify suspicious patterns.</p><div><h3></h3><ul><li><strong><a href="https://www.darktrace.com/en/products/detect/" title="AI-Powered Network Anomaly Detection" target="_blank" rel="">AI-Powered Network Anomaly Detection</a></strong>: Darktrace offers AI-based systems that analyze network traffic patterns in real-time to identify unusual behaviors that may indicate a breach or ongoing attack.&nbsp;</li><li><strong><a href="https://www.crowdstrike.com/cybersecurity-101/threat-hunting/" title="Automated Threat Hunting with AI" target="_blank" rel="">Automated Threat Hunting with AI</a></strong>: CrowdStrike provides AI-driven threat hunting tools that continuously scan an organization's environment for indicators of compromise.&nbsp;</li><li><strong><a href="https://www.splunk.com/en_us/products/enterprise-security.html" title="AI-Enhanced SIEM" target="_blank" rel="">AI-Enhanced SIEM</a></strong>: Splunk's advanced SIEM solution incorporates AI to correlate and analyze log data from multiple sources, providing more accurate threat detection and reducing false positives, detecting anomalies and supporting analysts to write better contextual searches.&nbsp;</li><li><strong><a href="https://www.exabeam.com/product/behavior-analytics/" title="AI-Driven User and Entity Behavior Analytics (UEBA)" target="_blank" rel="">AI-Driven User and Entity Behavior Analytics (UEBA)</a>:</strong>&nbsp;Exabeam's UEBA solution leverages AI to establish normal behavior patterns for users and entities within an organization, helping to detect insider threats, compromised accounts, or lateral movement by attackers.&nbsp;</li></ul></div></div></div></div></div></div>
</div></div></div><div data-element-id="elm_wcxoX-X--nyU0xMuxDkb6Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_wcxoX-X--nyU0xMuxDkb6Q"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_wcxoX-X--nyU0xMuxDkb6Q"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_NL2X1glOEe9ITdBYQJqiKg" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_JBIbOZ9hOjDnOb7gGFSorw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-7 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Pub547rhOFLlUZNyO0FGzw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-type3 zpheading-align-left " data-editor="true"><div style="color:inherit;"><h4><span style="font-size:32px;">AI-Specific Threats: Understanding Key Risks</span></h4></div></h2></div>
<div data-element-id="elm_rKpP5tVRjI5DdD7ru_n7AQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p><span style="color:inherit;">The </span><span style="color:inherit;"><a href="https://owasp.org/" title="OWASP Foundation" target="_blank" rel="">OWASP Foundation</a></span><span style="color:inherit;"> has created a list of the top security concerns for AI-driven applications, which can serve as a roadmap for identifying where AI systems might be vulnerable. Think of this list as a collection of the most common “watch-out” points in AI security. Each risk highlights a different way that AI applications — especially public or in-house models — can be exploited or mishandled if not managed carefully. Here’s a look at these risks and how they apply to today’s AI-driven cyber security landscape.</span></p><p><br/></p><p><span style="color:inherit;">The table below summarises the OWASP LLM-specific threats and maps them to the relevant sub-topics discussed above, offering a snapshot of where businesses are most vulnerable and which areas warrant careful attention. Refer to&nbsp;</span><a href="https://genai.owasp.org/" target="_blank" rel="">genai.owasp.org</a><span style="color:inherit;">&nbsp;for further insights. There is an <a href="https://owasp.org/www-project-machine-learning-security-top-10/" title="ML equivalent" target="_blank" rel="">ML equivalent</a> version which has many overlaps with the LLM Top 10. In the below list, it's arguable that an organisations cyber security team (which the SOC could be one part of) should be defending against all threats.</span></p></div>
</div></div></div></div></div></div><div data-element-id="elm_qiYi6Wa7_va083LtP8t9BA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-5 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_3ymfXHBhtiquHqaPZsrN1g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_3ymfXHBhtiquHqaPZsrN1g"] .zpimage-container figure img { width: 500px ; height: 331.70px ; } } @media (max-width: 767px) { [data-element-id="elm_3ymfXHBhtiquHqaPZsrN1g"] .zpimage-container figure img { width:415px ; height:276.63px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-medium zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/top-10-text-write-on-paper.jpg" width="415" height="276.63" loading="lazy" size="medium"/></picture></span></figure></div>
</div></div></div></div></div></div></div><div data-element-id="elm_KKnkVJjLtGHygTycchBHnQ" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg zscustom-section-59 "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_RpXGmqlcJMLsxBxKFb5JsQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_NjYgeV2o64Ckl-3KIjpYKQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0HfSTKhgklM-IbGYsa4zoQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:400;font-size:26px;">OWASP Top 10 LLM Threat Summary (Version 1.1)</span></h2></div>
<div data-element-id="elm_NbMAyJ5a2ydcZH7xM5xt7A" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_NbMAyJ5a2ydcZH7xM5xt7A"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-right zptable-header-dark zptable-header-top zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><th scope="col" style="width:33.3333%;"> OWASP Security Risk</th><th scope="col" style="width:33.3333%;"> Description</th><th scope="col" style="width:33.3333%;">Relevant Sub-Topics</th></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><strong>1. Prompt Injection</strong></span></td><td style="width:33.3333%;"><span style="color:inherit;">Crafting malicious inputs to manipulate LLM outputs, often leading to unauthorized actions or information leakage.</span></td><td style="width:33.3333%;"><span style="color:inherit;">Malicious Actors, Public AI Models, In-House AI</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">2. Insecure Output Handling</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Failing to properly handle or filter LLM outputs, which can lead to unintended disclosure or misuse of generated content.</span></td><td style="width:33.3333%;"><span style="color:inherit;">Public AI Models, In-House AI, Malicious Actors</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">3. Training Data Poisoning</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Manipulating the model’s training data to influence or corrupt future outputs, potentially leading to harmful or biased results.</span></td><td style="width:33.3333%;"><span style="color:inherit;">In-House AI, Malicious Actors</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">4. Model Denial of Service</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Attacks designed to overload or disrupt an LLM's availability, impacting its effectiveness in production environments.</span></td><td style="width:33.3333%;"><span style="color:inherit;">In-House AI, SOC Defence</span></td></tr><tr style="height:105.328px;"><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">5. Supply Chain Vulnerabilities</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Risks from using third-party models, plugins, or data sources that could be compromised.</span></td><td style="width:33.3333%;"><span style="color:inherit;">Public AI Models, In-House AI</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">6. Sensitive Information Disclosure</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Risks of unintentionally exposing confidential data in responses due to lack of filtering or model limitations.</span></td><td style="width:33.3333%;"><span style="color:inherit;">Public AI Models, In-House AI, SOC Defence, Malicious Actors</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">7. Insecure Plugin Design</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Vulnerabilities arising from plugins that interface with LLMs without secure validation or access controls.</span></td><td style="width:33.3333%;"><span style="color:inherit;">In-House AI, Malicious Actors</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">8. Excessive Agency</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Allowing the model too much autonomy, which may lead to unintended or risky actions without adequate oversight.</span></td><td style="width:33.3333%;"><span style="color:inherit;">In-House AI, Public AI Models</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">9. Overreliance</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Depending too heavily on LLMs for critical tasks, which could lead to errors or security risks if the model is compromised.</span></td><td style="width:33.3333%;"><span style="color:inherit;">Public AI Models, In-House AI</span></td></tr><tr><td style="width:33.3333%;"><span style="color:inherit;"><span style="font-weight:600;">10. Model Theft</span></span></td><td style="width:33.3333%;"><span style="color:inherit;">Unauthorized access to or copying of proprietary models, leading to intellectual property loss and security risks.</span></td><td style="width:33.3333%;" class="zp-selected-cell"><span style="color:inherit;">In-House AI, Malicious Actors</span></td></tr></tbody></table></div>
</div><div data-element-id="elm_ovpRxr98gkYuDrqbkFyyKA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_ovpRxr98gkYuDrqbkFyyKA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_ovpRxr98gkYuDrqbkFyyKA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div><div data-element-id="elm_gmUc9HHppyPmijkvw6Ghfw" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pNRWFliU2nPJ9izJ1WhgYQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Xy_d1MlyQ51GSIYWntX1LA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Xy_d1MlyQ51GSIYWntX1LA"] .zpimage-container figure img { width: 1280px !important ; height: 720px !important ; } } @media (max-width: 767px) { [data-element-id="elm_Xy_d1MlyQ51GSIYWntX1LA"] .zpimage-container figure img { width:415px ; height:384.62px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/futuristic-8350526_1280.png" width="415" height="384.62" loading="lazy" size="original" alt="Call To Action Image"/></picture></span></figure></div>
</div></div><div data-element-id="elm_FcwUbjSI138KND0tfH5oZw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_J8YtCLB5FjS5D7bMvLMshA" data-element-type="box" class="zpelem-box zpelement zpbox-container zsleft-overlay-box zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_J8YtCLB5FjS5D7bMvLMshA"].zpelem-box{ background-color:rgba(255, 255, 255, 0.95); background-image:unset; } </style><div data-element-id="elm_fozI2BOXEtUAC6qG40nVZA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Navigating the Brave New World of AI and Cybersecurity</span></h2></div>
<div data-element-id="elm__Yoo_eDW_tr6Sy2Ulyzs-A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><p>In this world where the lines between sci-fi and reality blur, AI has become both our greatest asset and our greatest challenge. As businesses push AI into critical functions, the security stakes only grow higher. The promise of AI is immense, yet so are the risks if left unchecked. Taking a proactive approach - whether by identifying hidden vulnerabilities, refining protocols, or teaming up with trusted experts - will be essential to protecting your organisation in this dynamic, AI-driven landscape.</p></div></div></div></div></div></div>
</div><div data-element-id="elm_IUQBXipuP_Nas9hR30zJsg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h5
 class="zpheading zpheading-style-type3 zpheading-align-left " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div style="color:inherit;"><span style="color:inherit;">If your organisation is ready to explore the frontier of secure AI or needs guidance to safeguard your systems, connect with our team at&nbsp;<a href="https://www.pebbletek.ai/">Pebble</a>. Together, let’s ensure your journey into the future is backed by best practices, resilient partnerships, and the strategies needed to thrive in this era where sci-fi-inspired technology has become reality!</span></div></div></div></h5></div>
</div></div></div><div data-element-id="elm_OAkPgy8GBYrbpxP0FqX4Kg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FHeg5R_Wx3YKWyOLC4qMXA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_8eOnKTPgjOaT-fCKfyBSgg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_8eOnKTPgjOaT-fCKfyBSgg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_8eOnKTPgjOaT-fCKfyBSgg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 29 Oct 2024 16:55:00 +1100</pubDate></item></channel></rss>