Aggregator
CVE-2024-10027 | WP Booking Calendar Plugin up to 10.6.2 on WordPress Setting cross site scripting
CVE-2024-10922 | chaser324 Featured Posts Scroll Plugin up to 1.25 on WordPress Setting cross-site request forgery
CVE-2024-51409 | Tenda O3 1.0.0.5 Network Packet denial of service
CVE-2024-51990 | martinvonz jj up to 0.22.x Git Repository path traversal (GHSA-88h5-6w7m-5w56)
CVE-2024-48325 | Portabilis i-Educar 2.8.0 getDocuments instituicao_id sql injection
A Critical Guide to Securing Large Language Models
A Critical Guide to Securing Large Language Models
madhav
Thu, 11/07/2024 - 06:25
Securing large language models (LLMs) presents unique challenges due to their complexity, scale, and data interactions. Before we dive into securing them, let’s touch on the basics.
- What are LLMs? LLMs are Large Language Models that are advanced artificial intelligence systems designed to understand and generate human-like text.
- How popular are LLMs? Incredibly, as they generate text, images, answer questions, and write creative content for you.
- How do businesses use LLMs? They enhance customer service, create content, summarize research, analyze large datasets, and translate languages.
Securing LLMs is critical as they are trained on massive datasets that contain sensitive information. Protecting LLMs from unauthorized access or misuse is vital.
The Thales Solution for LLM Security- CTE agent: The CTE (CipherTrust Transparent Encryption) agent is a software component installed at the kernel level on a physical or virtual machine. It encrypts and protects data on that machine. Once installed, the CTE agent enables encryption for any number of devices or directories on the machine, ensuring that only authorized users and processes can access the encrypted data at file system level transparent to the application.
- CTE-U agent: The CTE-U (CipherTrust Transparent Encryption UserSpace) agent is a user-space level encryption solution that serves the same fundamental purpose, as the CTE agent. Unlike the CTE agent, the CTE-U agent operates at the user-space level.
CipherTrust Transparent Encryption (CTE), is part of the CipherTrust Data Security Platform (CDSP) which delivers data-at-rest encryption with centralized key management, privileged user access control and detailed data access audit logging. Protecting data wherever it resides, on-premises, across multiple clouds and within big data, and Kubernetes environments. The deployment is simple, scalable, and fast, with agents installed at operating, filesystem or device layer, and encryption and decryption are transparent to all applications that run above it. CipherTrust Transparent Encryption is designed to meet data security compliance and best practice requirements with minimal disruption, effort, and cost. Implementation is seamless keeping both business and operational processes working without changes even during deployment and roll out. The solution works in conjunction with the FIPS 140-2 up to Level 3 compliant CipherTrust Manager, which centralizes encryption key and policy management for CDSP.
Benefits of CipherTrust Transparent EncryptionSimplified Management: CipherTrust Manager provides a unified management console that enables you to discover and classify sensitive data and protect data using integrated Thales Data Protection Connectors across on-premises data stores and multi-cloud deployments. It offers advanced self-service licensing for improved visibility and control of licenses.
Cloud-friendly Deployment: CipherTrust Manager offers users additional hosting options, and can run as a native virtual machine on AWS, Microsoft Azure, Google Cloud, VMware, Microsoft HyperV and more. Additionally, native support for CipherTrust Cloud Key Management is available on CipherTrust Manager to streamline key management across multiple cloud infrastructures and SaaS applications.
Flexible Form Factors:CipherTrust Manager is available in both virtual and physical form factors. Flexible deployment options can easily scale to provide key management at remote facilities or in cloud infrastructures. CipherTrust Manager supports managing keys in the FIPS 140 L3 boundary of Luna Network HSM.
Protect LLMs with Thales
To Protect LLMs, the Thales CipherTrust Data Security Platform with Transparent Encryption is used, whereas enterprises can leverage Thales’ advanced data protection features within the CipherTrust platform. Thales is a trusted brand in the LLM Security Industry. View our comprehensive White Paper for information on LLM Security. We'll continue to innovate with LLM Security and continue publishing updates in future articles.
Data Security Compliance Encryption Key Management Cloud Security Doug Bies | Product Marketing Manager
More About This Author >
Schema
{
"@context": "https://schema.org",
"@type": "BlogPosting",
"headline": "A Critical Guide to Securing Large Language Models",
"description": "Explore the complexities of securing large language models (LLMs) and learn how Thales’ CipherTrust Transparent Encryption (CTE) provides advanced protection for sensitive data and compliance across cloud and on-premises environments.",
"datePublished": "2024-11-07",
"author": {
"@type": "Person",
"name": "Doug Bies",
"url": "https://cpl.thalesgroup.com/blog/author/dbies",
"sameAs": "https://www.linkedin.com/in/doug-bies-440487a/"
},
"publisher": {
"@type": "Organization",
"name": "Thales Group",
"description": "The world relies on Thales to protect and secure access to your most sensitive data and software wherever it is created, shared, or stored. Whether building an encryption strategy, licensing software, providing trusted access to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.",
"url": "https://cpl.thalesgroup.com",
"logo": "https://cpl.thalesgroup.com/sites/default/files/content/footer/thaleslogo-white.png",
"sameAs": [
"https://www.facebook.com/ThalesCloudSec",
"https://www.twitter.com/ThalesCloudSec",
"https://www.linkedin.com/company/thalescloudsec",
"https://www.youtube.com/ThalesCloudSec"
]
},
"mainEntityOfPage": "https://cpl.thalesgroup.com/blog/data-security/securing-large-language-models"
}
The post A Critical Guide to Securing Large Language Models appeared first on Security Boulevard.
CVE-2015-2902 | HP ArcSight SmartConnectors up to 7.1.5 X.509 Certificate Chain Validation cryptographic issues (VU#350508 / ID 1034078)
WebSenor InfoTech Sql Injection
Vibgyor Media Info Solutions - Blind Sql Injection Vulnerability
Vibgyor Media Info Solutions Sql Injection
IBM Security Verify Access Appliance Insecure Transit / Hardcoded Passwords
ESET NOD32 Antivirus 18.0.12.0 Unquoted Service Path
SQLite3 generate_series Stack Buffer Underflow
ABB Cylon Aspect 3.08.00 Off-By-One
Critical bug in Cisco UWRB access points allows attackers to run commands as root
CVE-2006-0870 | Mini-Nuke Mini-Nuke CMS up to 1.8.2 pages.asp id sql injection (EDB-1514 / XFDB-24803)
经纬信安与中国信通院联合起草通信行业标准实施,彰显企业实力与责任
导语:经纬信安参与起草了《电信网和互联网网络安全能力成熟度评价模型》这一通信行业标准,该标准适用于指导互联网网络安全能力评价活动及实施监督管理。该标准的制定,不仅体现了经纬信安在网络安全领域的专业实力和行业领导地位,也标志着公司在推动行业规范化和高质量发展方面迈出了坚实的步伐。
为了提升网络安全管理水平,落实法律法规要求,建立健全数据安全标准体系,强化行业安全管理,应对新技术产品和服务的技术性安全风险,并为企业提供全面的网络安全建设参考,工业和信息化部等相关部门将其列入行业标准立项计划,组织科研机构、行业专家、企业代表等成立标准起草工作组。工作组成员收集国内外相关标准、法规、实践等资料,调研行业网络安全现状、问题及挑战。
经纬信安成为该标准的起草单位之一,是因在网络安全领域的技术创新尤为突出,特别是在主动防御体系方面取得了显著成果,并成功融合了先进框架以提升防御能力;同时,公司积累了丰富的项目实施和攻防演练经验,服务于多领域并在重大活动中表现出色,能为标准的制定提供丰富的实际案例;加之其专业团队技术功底深厚、行业经验丰富,取得了多项研究成果,为标准制定提供专业的实践和坚实的理论支持;此外,经纬信安还具备良好的企业资质认证和众多行业荣誉,充分展现了其在技术研发、产品质量和企业影响力方面的实力。
作为起草单位之一,经纬信安在《电信网和互联网网络安全能力成熟度评价模型》的制定过程中提供了宝贵的实践经验和技术支持,为标准的制定提供了坚实的技术基础,为行业树立了标杆,促进了技术创新和产品质量的提升。
该行业标准介绍如下:
1.适用范围
该标准规定了电信网和互联网网络安全能力成熟度模型的构成、等级划分标准、关键能力域和成熟度要求。
该标准适用于指导电信网和互联网网络运营者和第三方安全评价机构开展电信网和互联网网络安全能力评价活动,也适用于运营者开展网络安全能力建设及电信管理机构实施监督管理。
2.能力成熟度评价要素
电信网和互联网网络安全能力成熟度评价要素包括10个网络安全关键能力域,其中制度管理、组织和人员管理、资产管理、风险管理、供应链管理等属于识别过程域,系统和通信防护、运行维护、检测评估安全防护类过程域,态势感知、网络安全事件管理等属于监测、处置类过程域。通过量化评价能力域及具体的评价指标,开展网络安全能力成熟度评价。
3.成熟度等级定义
网络安全能力成熟度等级分为五级,自低向高依次为初始级、控制级、规范级、优化级、卓越级。每个成熟度级别代表运营者网络安全防护能力所达到的水平,例如,卓越级具备成熟完善的网络安全管理体系与相应实践能力,实现数字化、智能化,并在此基础上持续跟踪业界新型技术架构发展演进。
4.评价模型构成
网络安全能力成熟度评价模型包括能力成熟度等级、网络安全关键能力域、网络安全管理生命周期三个维度。能力成熟度评价将覆盖网络安全管理全生命周期,贯穿识别、防护、监测、处置各阶段,形成闭环。
5.关键能力域
模型中定义了多个关键能力域,如制度管理,包括网络安全规划和网络安全管理制度等。每个能力域都有具体的成熟度要求,运营者必须满足该级别及其前面级别的所有要求才能获得该能力域的判定。
6.评价流程与方法
评价流程包括评价准备、评价计划、评价实施、评价分析、评价报告五个环节。评价方法包括访谈、核查、测试等,通过量化评价能力域及具体的评价指标,开展网络安全能力成熟度评价。
公司及产品介绍:
经纬信安(LalonSec)成立于2015年11月,总部位于北京,南京、杭州、武汉等多地设有子公司及办事处,是国家高新技术企业。经纬信安致力于网络攻防对抗、主动防御,提供主动防御网络安全产品、主动防御解决方案及体系化安全服务。产品及服务已广泛应用于政府、金融、通信、交通、电力、教育、医疗等众多领域。
经纬信安作为主动防御开创者,2020年至2023年多次上榜《网络安全创新能力50强》、《网络安全产业100强》、《中国网络安全百强》、《数字安全“专精特新”百强企业》,《中国网络安全百强创新者》、《中国网络安全创业公司HOT51》。一体化主动防御方案曾荣获江苏省优秀实践案例第一名,荣获2023年江苏省信息技术应用创新优秀应用示范案例,荣获2023数字化创新优秀解决方案。
公司核心产品有:见未形风险评估系统(ASM)、戍将攻击诱捕平台(IDH)、戍将拟态防御平台(X-IDH)、威胁情报中心(XTI)、纬将扩展检测响应平台(XDR)、纬将安全编排和自动化响应平台(SOAR)、经兵端点检测响应平台(EDR)。
参与行业标准的起草,是经纬信安对行业负责的体现。通过这一过程,我们能够确保我们的产品和服务符合最新的行业要求,还能够推动整个行业的技术进步和创新。经纬信安始终致力于成为行业的引领者,而参与标准制定正是实现这一目标的重要步骤。