Archive for AppSOC

AppSOC Recognized as a Representative Vendor in the 2025 Gartner Market Guide for AI Trust, Risk and Security Management

Posted in Commentary with tags on February 25, 2025 by itnerd

AppSOC has announced its inclusion as a Representative Vendor in the Gartner Market Guide for AI TRiSM (Trust, Risk, and Security Management).* In our view, AppSOC was recognized for including operational governance and runtime controls using tools such as posture management, AI discovery, Red Teaming, model testing, and AI supply chain security. We believe this recognition underscores AppSOC’s commitment to providing comprehensive solutions for managing AI’s complex risks and operational integrity.

AppSOC’s AI security capabilities include:

  • AI Discovery: identifying AI projects, models, and risks,
  • AI Model Testing: automating Red Teaming to pinpoint weaknesses,
  • AI Security Posture Management: hardening AI platforms against misconfigurations, malware, and access risks,
  • AI Runtime Enforcement: preventing AI tools from leaking sensitive data through attacks or misuse.

* Gartner, Market Guide for AI Trust, Risk and Security Management, Avivah LitanMax Goss, 18 February 2025

AppSOC is an innovative Silicon Valley security provider, leading the way in AI governance and application security. AppSOC enables AI initiatives with enhanced visibility, robust guardrails and runtime defense, while protecting the entire AI stack from code to cloud to data. Founded by industry veterans, AppSOC brings unparalleled expertise in AI, cloud application security, data protection, and risk management. For more information, please visit www.appsoc.com.

AppSOC Named a Featured Launch Partner for the Second Edition of the Cutting-Edge Databricks AI Security Framework

Posted in Commentary with tags on February 20, 2025 by itnerd

AppSOC, a leader in AI governance and application security, proudly announces its continued partnership with Databricks, the Data and AI company, to support the recent release of the Databricks AI Security Framework (DASF) 2.0. This collaboration underscores AppSOC’s commitment to delivering advanced security and governance solutions tailored to the evolving needs of Databricks customers.

Building on the success of its initial support for Databricks’ AI Security Framework, AppSOC now offers enhanced capabilities for DASF 2.0. These include:

  • AI Discovery: Automated discovery of models, datasets, and workflows ensures continuous visibility and compliance.
  • AI Model Validation & Red Teaming: Continuous scanning and automated Red Teaming proactively identify vulnerabilities, weaknesses, and other potential security issues.
  • AI Security Posture Management: Detects and mitigates misconfigurations, access control issues, asset leaks, and model theft risks across Databricks MLOps environments.
  • Runtime Enforcement: Real-time threat detection and automated remediation guard against prompt injections, malicious code, data leaks, and other runtime threats.
  • Governance and Compliance: Simplifies regulatory adherence by mapping security findings to DASF 2.0 controls and other industry standards, including NIST AI-RMF and ISO 42001.

AppSOC’s solutions empower Databricks customers to manage AI risk proactively and prevent potential security and compliance incidents before they occur. The joint solution ensures that AI models, datasets, notebooks, and workflows are secured through advanced, automated features.

AppSOC Tests DeepSeek And Finds A Wide Range Of Flaws

Posted in Commentary with tags on February 11, 2025 by itnerd

AppSOC, specialists in AI governance and application security, today published “Testing the DeepSeek-R1 Model: A Pandora’s Box of Security Risks detailing in-depth model testing that reveals a wide range of flaws with high failure rates. 

Through a combination of automated static analysis, dynamic tests, and red-teaming techniques, the DeepSeek-R1 model was put through scenarios that mimic real-world attacks and security stress tests using AppSOC’s AI Security Platform and risk scoring.

Among alarming results: 

  • Jailbreaking: Failure rate of 91%. DeepSeek-R1 consistently bypassed safety mechanisms meant to prevent the generation of harmful or restricted content.
  • Prompt Injection Attacks: Failure rate of 86%. The model was highly susceptible to adversarial prompts, resulting in incorrect outputs, policy violations, and system compromise.
  • Malware Generation: Failure rate of 93%. Tests showed DeepSeek-R1 capable of generating malicious scripts and code snippets at critical levels.
  • Supply Chain Risks: Failure rate of 72%. The lack of clarity around the model’s dataset origins and external dependencies heightened its vulnerability.
  • Toxicity: Failure rate of 68%. When prompted, the model generated responses with toxic or harmful language, indicating poor safeguards.
  • Hallucinations: Failure rate of 81%. DeepSeek-R1 produced factually incorrect or fabricated information at a high frequency.

You can read the research here.

Experts From Dispersive And AppSOC Share What They Expect In 2025

Posted in Commentary with tags , on December 28, 2024 by itnerd

Today Lawrence Pingree, VP with stealth networking leader Dispersive (formerly Research Directory, Gartner Inc.) and Willy Leichter, CMO with AI cybersecurity innovator AppSOC, share what to expect in 2025.

Lawrence Pingree, VP, Dispersive:

Increased Sophistication: Hackers will likely continue to refine their techniques, leveraging advanced tools and strategies to exploit vulnerabilities and bypass security measures. This includes utilizing AI and machine learning to automate attacks and make them more effective.

Targeting VPNs: VPNs will remain a prime target, as they provide access to sensitive data and systems. Expect to see more attacks aimed at exploiting VPN vulnerabilities and compromising user credentials. It’s more important than ever to educate users about phishing threats: phishing remains the primary cause of data breaches (80-95%).

Lateral Movement: Once inside a network, hackers will focus on lateral movement, seeking to gain access to additional systems and data. This could involve techniques such as privilege escalation and credential theft. Meaning that Zero Trust network access and technologies like dispersive become required to address the latest threats.

Data Exfiltration: The ultimate goal of many attacks will be to exfiltrate sensitive data, such as customer information, financial records, and intellectual property. Hackers may employ various methods to steal data, including malware, phishing, and social engineering.

Disruption of Operations: In addition to data theft, hackers may also aim to disrupt business operations, causing downtime and financial losses. This could involve launching denial-of-service attacks or deploying ransomware to cripple critical systems.

Evolving Tactics: Hackers will constantly adapt their tactics to stay ahead of security defenses. This means that organizations must remain vigilant and proactive in their security efforts.

Here are some additional events & insights from 2024 that demonstrate what needs to happen in 2025:

  1. The Check Point Quantum Gateway vulnerability (CVE-2024-24919) highlights the importance of patching vulnerabilities but also upgrading to VPN technologies that eliminate the attack surfaces exposed promptly.
  2. The rise of AI and machine learning in cyberattacks poses a significant challenge for security professionals, expected to continue in 2025, but be increasingly multi-dimensional powered by AI.
  3. Organizations need to adopt a multi-layered approach to security, combining technology with strong policies and employee education, focus on Preemptive cyber defense technologies, instead of being so reliant on detection and response.

So, what to do? Lawrence notes that 2025’s threat landscape will likely be even more challenging than in previous years. Prioritizing cybersecurity and investing in robust defenses is the only way to protect their data and systems. He recommends the following:

1. Prioritize VPN security: 56% of organizations experience VPN-related cyberattacks and 91% share concerns about VPN security. Implementing robust next-generation VPN security measures is imperative. 

2. Adopt zero-trust strategies: 78% of organizations plan to implement zero-trust strategies, and this is an excellent opportunity for practitioners to adopt a more secure approach by verifying the identity of all users and devices before granting access to sensitive resources. No one wants to be the weakest member of the herd and therefore the easiest target.

3. Monitor for ransomware attacks: ransomware is one of the top threats exploiting VPN vulnerabilities (42%), it is crucial to stay vigilant in monitoring networks for signs of ransomware activity, such as unusual network traffic or suspicious user behavior. 

4. Do regular security audits and penetration testing: The threat landscape is growing, as the 30% increase in malware attacks between 2023 and 2024 indicates. Security audits and penetration testing can help identify vulnerabilities before they are exploited by attackers. 

5. Invest in incident response planning: With over 7 billion records exposed in data breaches, a robust incident response plan is essential for minimizing breach impacts.

6. Implement security measures to prevent DDoS attacks: DDoS attacks are another top threat exploiting VPN vulnerabilities (30%), and implementing security measures such as rate limiting and IP blocking can mitigate these types of attacks. 

7. Monitor data breaches closely: The average cost of a data breach in 2024 is $4.88 million, highlighting the importance of monitoring for signs of data breaches and taking swift action when they occur. 

8. Keep up to date with security patches and updates: With an increase in malware attacks between 2023 and 2024 (30%), it is essential to stay current with the latest security patches and updates for all systems, including the latest generation of preemptive defense VPNs that Dispersive provides, to reduce the attack surface and prevent exploitation of known vulnerabilities. 

9. Develop a comprehensive cybersecurity strategy: By addressing these statistics and implementing robust security measures, organizations can reduce their risk exposure and protect against diverse types of cyber threats.

10. Educate users about phishing threats: Phishing remains the primary cause of data breaches (80-95%). It’s essential that your users know how to recognize and avoid phishing attacks, including those that may be launched through VPNs. 

Willy Leichter, CMO, AppSOC said:

  • AI offense will have an edge over AI defense: We know that AI will be used increasingly on both sides of the cyber war. However, attackers will continue to be less constrained because they worry less about AI accuracy, ethics, or unintended consequences. Techniques such as highly personalized phishing and scouring networks for legacy weaknesses will benefit from AI. While AI has huge potential defensively, there are more constraints – both legal and practical, that will slow adoption.
  • AI systems will become targets: AI technology greatly expands the attack surface area with rapidly emerging threats to models, datasets, and MLOps systems. Also, when AI applications are rushed from the lab to production, the full security impact won’t be understood until the inevitable breaches occur.
  • Security teams will have to take charge over AI security: This sounds obvious, but in many organizations, initial AI projects have been driven by data scientist and business specialists, who often bypass conventional application security processes. Security teams will fight a losing battle if they try to block or slow down AI initiatives, but they will have to bring rogue AI projects under the security and compliance umbrella.
  • Supply chain exposure will expand: We’ve already seen supply chains become a major vector for attack, as complex software stacks rely heavily on third-party and open-source code. The explosion of AI adoption makes this target larger with new complex vectors of attack on datasets and models. Understanding the lineage of models and maintaining integrity of changing datasets is a complex problem, and currently there is no viable way for an AI model to “unlearn” poisonous data.

AppSOC Announces Integration with Databricks 

Posted in Commentary with tags on November 19, 2024 by itnerd

AppSOC, a leader in AI governance and application security, today announced the launch of its AI Security & Governance solutions tailored for the Databricks Data Intelligence Platform. This collaboration introduces robust security, governance, and compliance capabilities for organizations leveraging Databricks to develop and deploy AI models at scale. The integration is designed to address the growing need for securing AI models and workflows, enabling Databricks users to innovate confidently while maintaining stringent governance standards. The release also coincides with AppSOC validation in the Databricks Technology Partner program.

With the rapid adoption of AI, enterprises face a unique challenge: how to secure and govern AI systems without impeding innovation. AppSOC’s new solutions seamlessly integrate with the Databricks Data Intelligence Platform, providing end-to-end security, including AI discovery, model scanning, runtime threat protection, and data leak prevention. The solution provides comprehensive coverage for the Databricks AI Security Framework (DASF), helping customers ensure that their AI systems remain secure, compliant, and aligned with best practices.

AppSOC’s solutions help Databricks users manage AI risk proactively and prevent potential security and compliance incidents before they happen. The joint solution secures AI models, datasets, notebooks, and workflows through key features including:

  • AI Discovery: Automated detection of AI models, datasets, and assets within Databricks to ensure adherence to security best practices.
  • AI Security Testing: Continuous scanning and Red Teaming of AI models to detect malware, vulnerabilities, and API calls to connected enterprise applications.
  • AI Security Posture Management: Preventing misconfiguration, access control issues, model theft, malicious libraries, and supply chain attacks.
  • AI Runtime Enforcement: Detecting data leaks prompt injections, data poisoning, jailbreaking, and malicious code, with automated enforcement actions.
  • AI Governance and Compliance: Integrated workflows for governing AI development, ensuring compliance with DASF and other industry frameworks.

Gartner Cites AppSOC As An AI TRiSM (AI Governance, Trust, Risk and Security) Vendor

Posted in Commentary with tags on November 14, 2024 by itnerd

AppSOC has announced its mention as a Sample AI TRiSM Vendor in the Gartner latest report Use TRiSM to Manage AI Governance, Trust, Risk, and Security. AppSOC was mentioned in all three key categories of the report: AI Governance, AI Security Testing, and AI Runtime Enforcement. We believe this recognition underscores AppSOC’s commitment to providing comprehensive solutions for managing AI’s complex risks and operational integrity.

The Gartner report outlines essential strategies and tools for TRiSM (Trust, Risk, and Security Management) in AI, a critical framework for organizations leveraging AI in high-stakes, rapidly evolving environments. AppSOC’s placement in multiple TRiSM categories reflects its unique capabilities in addressing AI-specific security and compliance needs.

AppSOC’s AI security capabilities include the following:

  • AI Governance: Supports policy compliance, regulatory alignment, and ethical AI practices, enabling transparent and controlled AI deployment.
  • AI Security Testing: Detects vulnerabilities and ensures that AI models are robust, secure, and resistant to potential threats before they go into production.
  • AI Runtime Enforcement: Prevents unauthorized or unsafe AI operations during runtime, ensuring continuous adherence to AI policies and safeguards.

AppSOC is an innovative Silicon Valley security provider, leading the way in AI governance and application security. AppSOC enables AI initiatives with enhanced visibility, robust guardrails and runtime defense, while protecting the entire AI stack from code to cloud to data. Founded by industry veterans, AppSOC brings unparalleled expertise in AI, cloud application security, data protection, and risk management. For more information, please visit www.appsoc.com.

AppSOC Unveils AI Security Platform 

Posted in Commentary with tags on August 6, 2024 by itnerd

AppSOC, an innovation leader in security and risk management, today announced the launch of pioneering capabilities for safeguarding artificial intelligence (AI) applications and agents while providing the visibility and governance that enterprises need to leverage AI with confidence.

Businesses across sectors are recognizing the immense potential of AI, but the rush to deploy new AI solutions has outpaced security, introducing substantial new risks. As the first application security vendor to address the unique challenges of AI security, AppSOC is setting a new industry standard by integrating these capabilities directly into their robust platform. This powerful combination of AI and application security enables customers to detect, prioritize, and remediate issues across AI and connected applications, without creating new security silos. 

The AppSOC solution leverages new industry frameworks for categorizing AI risk including the OWASP Top 10 LLM Risks. AI security issues detected are mapped to these frameworks providing customers with confidence that they are aligned with industry best practices.

AppSOC’s new AI security and governance capabilities include:

  • Shadow AI Discovery: providing visibility into unsanctioned AI models and agents to ensure security best practices and compliance
  • AI Governance: proactively creating resource inventories, use-case repositories, and approval workflows for AI projects to ensure trust, safety and accountability
  • AI Posture Management & Data Protection: detecting security misconfigurations, applying guardrailsand protecting against data leaks
  • Content Anomaly Detection and Data Compliance: runtime analysis of prompts and responses to address application abuse and attacks such as prompt injection
  • AI Supply Chain Security: ensuring the integrity of AI applications and agents to mitigate security, reliability, and licensing risks associated with open-source models and datasets
  • Protection for Connected Applications: safeguarding critical enterprise applications connected to AI systems against security breaches

To learn more about AppSOC AI security and see a live demonstration, please register for an upcoming webinar on August 13, at 10:00 am PDT.