{"id":146521523,"date":"2023-04-04T06:18:00","date_gmt":"2023-04-04T06:18:00","guid":{"rendered":"https:\/\/danconn.dev\/blog\/2023\/04\/04\/how-to-secure-ai-and-its-supply-chains\/"},"modified":"2024-07-28T10:46:46","modified_gmt":"2024-07-28T10:46:46","slug":"how-to-secure-ai-and-its-supply-chains","status":"publish","type":"post","link":"https:\/\/danconn.dev\/blog\/2023\/04\/04\/how-to-secure-ai-and-its-supply-chains\/","title":{"rendered":"How To Secure AI and It&#039;s Supply Chains"},"content":{"rendered":"<h2 class=\"wp-block-heading\">I write an opinion piece in Infosecurity Magazine<\/h2><figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/danconn.dev\/blog\/wp-content\/uploads\/2024\/07\/8aad82e6-6f78-4541-96d7-25bcecd1a9a3_1506x1152.png\" alt=\"\"\/><\/figure><p>Wow! Infosecurity Magazine is a huge stalwart of the industry and I\u2019m so happy to have written an opinion piece in it! <br\/><br\/>Artificial Intelligence has been with us for 75 years and has been something that I\u2019ve been interested in since building a few neural networks for one role and a neuro-fuzzy reasoner to detect the suitability of passwords about 8 years ago.  The recent reinvigoration thanks to LLMs has been interesting, but also startling as we seem to be suffering from mass anthropomorphism in regards to its actual abilities. <br\/><br\/>That being said, it is still, I believe, going to be a very important tool for us to use. We just need to remember it\u2019s a tool and it doesn\u2019t think. In my op-ed I was fortunate to be able to collate the work of Rob van Der Veer at OWASP, with a recent BCS webinar on securing AI. I hope it is a brief read into the status quo and the links give you some good further reading. <br\/><br\/><a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/secure-ai-software-supply-chains\/\">You can find the article here &#8211; enjoy!<\/a><\/p><div class=\"subscription-widget-wrap-editor\" data-attrs=\"{&quot;url&quot;:&quot;https:\/\/danconn.substack.com\/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}\" data-component-name=\"SubscribeWidgetToDOM\"><div class=\"subscription-widget show-subscribe\"><div class=\"preamble\"><p class=\"cta-caption\">Thanks for reading Code, Hack, Run, Drink!! Subscribe for free to receive new posts and support my work.<\/p><\/div><form class=\"subscription-widget-subscribe\"><input type=\"email\" class=\"email-input\" name=\"email\" placeholder=\"Type your email\u2026\" tabindex=\"-1\"\/><input type=\"submit\" class=\"button primary\" value=\"Subscribe\"\/><div class=\"fake-input-wrapper\"><div class=\"fake-input\"\/><div class=\"fake-button\"\/><\/div><\/form><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>I write an opinion piece in Infosecurity Magazine<\/p>\n","protected":false},"author":2,"featured_media":147072121,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[64,69,68,63,65,66,67,15],"class_list":["post-146521523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications","tag-ai","tag-artificial-intelligence","tag-data-poisoning","tag-infosecurity-magazine","tag-llms","tag-secure-ai","tag-software-supply-chains","tag-vulnerability-managment"],"_links":{"self":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146521523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/comments?post=146521523"}],"version-history":[{"count":2,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146521523\/revisions"}],"predecessor-version":[{"id":147072254,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/posts\/146521523\/revisions\/147072254"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/media\/147072121"}],"wp:attachment":[{"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/media?parent=146521523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/categories?post=146521523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/danconn.dev\/blog\/wp-json\/wp\/v2\/tags?post=146521523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}