Jump to Content
Security & Identity

The Defender's Advantage Cyber Snapshot Issue 4 — Attacks at the Edge and Securing AI

August 15, 2023
Mandiant

Written by: Shelly Tzoumas


What happens when attackers target devices at the edge of our network infrastructure that are not protected by Endpoint Detection and Response tools?

Amidst a rash of incidents involving exploitation of zero-day vulnerabilities in security devices and internet-exposed systems, this is just one of the questions we set out to explore in the fourth and latest issue of The Defender’s Advantage Cyber Snapshot.

In this issue, we pair a deep dive on edge device attacks with guidance on cybersecurity crisis communications to demonstrate how organizations can build trust throughout an incident response event with effective communications. The issue also addresses a topic on the minds of most enterprise security teams: AI. We cover advances in artificial intelligence, how to ensure security is built into AI systems, and capabilities provided by security vendors.

The fourth issue of The Defender’s Advantage Cyber Snapshot covers a lot of ground, and has a little something for everybody, including:

  • Securing Artificial Intelligence Systems: AI is advancing rapidly, and it is important to build security in from the start. To achieve this, Google recently introduced the Secure AI Framework (SAIF), a conceptual framework for secure AI systems.
  • 4 Phases of Cybersecurity Crisis Communications: Communicating during a cyber crisis is tough for even the savviest and most well-prepared organizations. Being ready before the breach happens is key.
  • Business IoT Targeted by Espionage Groups: We previously observed IoT devices, smart devices, and routers compromised and used to support cybercrime, and now we are seeing similar tactics used for espionage.
  • Establishing Resilience Against Edge Device Attacks: Edge devices by definition sit outside the typical detection range of most organizations, thus providing attackers with enormous value during intrusions.
  • 6 Tips for Implementing Privileged Assessment Management: Privileged Access Management can help organizations struggling to reduce unnecessary accounts and remove excessive privileges for humans and systems that do not require it.

The Defender’s Advantage Cyber Snapshot launched in 2022 with the goal of offering insights into cyber defense topics of growing importance based on Mandiant frontline observations and real-world experiences.

Download the latest issue of The Defender’s Advantage Cyber Snapshot today.

Posted in