article thumbnail

Zero Trust Network Architecture vs Zero Trust: What Is the Difference?

Joseph Steinberg

But, even those who have a decent grasp on the meaning of Zero Trust seem to frequently confuse the term with Zero Trust Network Architecture (ZTNA). Zero Trust Network Architecture is an architecture of systems, data, and workflow that implements a Zero Trust model. In short, Zero Trust is an approach.

article thumbnail

Regulating AI Behavior with a Hypervisor

Schneier on Security

To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity. The basic idea is that many of the AI safety policies proposed by the AI community lack robust technical enforcement mechanisms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Applying Security Engineering to Prompt Injection Security

Schneier on Security

This seems like an important advance in LLM security against prompt injection: Google DeepMind has unveiled CaMeL (CApabilities for MachinE Learning), a new approach to stopping prompt-injection attacks that abandons the failed strategy of having AI models police themselves.

article thumbnail

DOGE as a National Cyberattack

Schneier on Security

DOGE personnel are also reported to be feeding Education Department data into artificial intelligence software, and they have also started working at the Department of Energy. But given that DOGE workers have already copied data and possibly installed and modified software, it’s unclear how this fixes anything.

article thumbnail

Software Vulnerabilities in the Boeing 787

Schneier on Security

Boeing maintains that other security barriers in the 787's network architecture would make that progression impossible. Santamarta admits that he doesn't have enough visibility into the 787's internals to know if those security barriers are circumventable.

Software 271
article thumbnail

Threat Modeling and Architecture

Adam Shostack

[no description provided] " Threat Modeling and Architecture " is the latest in a series at Infosec Insider. After I wrote my last article on Rolling out a Threat Modeling Program, Shawn Chowdhury asked (on Linkedin) for more informatioin on involving threat modeling in the architecture process. What can go wrong?

article thumbnail

Russian organizations targeted by backdoor masquerading as secure networking software updates

SecureList

ViPNet is a software suite for creating secure networks. We determined that the backdoor was distributed inside LZH archives with a structure typical of updates for the software product in question. Impersonating a ViPNet update Our investigation revealed that the backdoor targets computers connected to ViPNet networks.