Tenable launches tool for securing enterprise AI
Exposure management company Tenable has expanded its Tenable One platform with a solution aimed at helping users detect, manage and control risks introduced by AI usage.
Tenable AI Exposure is designed to help security teams address the entire life cycle of AI security challenges, including gaining visibility into how employees use AI tools, which sensitive data may be exposed and how they can be manipulated by attackers.
The solution unifies insights from the existing Tenable AI Aware tool with scanning from the company’s AI Security Posture Management solution to discover and identify all AI usage across an enterprise environment, whether sanctioned or unsanctioned. The company says it can prioritise and manage risks from sensitive data leakage, misconfigurations, and unsafe integrations between AI systems and external tools.
Security teams can also utilise the solution to enforce security policies by controlling how AI is used, preventing risky behaviours, and mitigating threats such as prompt injections, jailbreaks and malicious output manipulation.
Tenable Co-CEO and CFO Steve Vintz said with AI becoming more sophisticated, simply discovering shadow AI usage is no longer enough.
“A true exposure management strategy requires an end-to-end solution that lets organisations discover their entire AI footprint, manage the associated risks, and govern its use according to their policies,” he said. “With Tenable AI Exposure, we’re giving organisations the visibility and control they need to safely embrace the promise of generative AI without introducing unacceptable risk. This is a critical step in the evolution of exposure management.”
Palo Alto seeks to redefine application security
Palo Alto Networks' new Cortex Cloud APSM solution is aimed at resolving security risks...
HPE unveils new security tools at Black Hat USA
HPE has introduced a range of new AI-driven security capabilities at the annual Black...
CISA and Microsoft warn of "active attacks" on SharePoint
Alerts have been published warning of active attacks exploiting a remote code execution...