CybersecurityOffensive Security

AI Security

Overview

The discipline of protecting AI systems from adversarial attacks, data poisoning, model theft, and prompt injection while ensuring the secure deployment of AI in production environments.

Cross-References(1)

Natural Language Processing

More in Cybersecurity

Phishing-Resistant Authentication

Identity & Access

Authentication methods such as FIDO2 passkeys and hardware security keys that are immune to phishing attacks because credentials are cryptographically bound to the legitimate service.

Runtime Application Self-Protection

Offensive Security

Security technology embedded within applications that detects and blocks attacks in real time by monitoring application behaviour and request patterns during execution.

Deception Technology

Identity & Access

Security solutions that deploy decoy assets such as fake servers, credentials, and data to detect, misdirect, and analyse attackers who have breached perimeter defences.

Cloud Security Posture Management

Security Governance

Automated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.

Security Information and Event Management

Offensive Security

Technology that aggregates and analyses security data from across an organisation to detect threats.

Buffer Overflow

Offensive Security

A programming error where data written to a buffer exceeds its capacity, potentially allowing code execution.

Security by Design

Security Governance

An approach that integrates security considerations into every stage of the software development lifecycle.

Attack Surface Management

Offensive Security

The continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.

See Also