{"id":1728,"date":"2025-01-18T17:06:08","date_gmt":"2025-01-18T15:06:08","guid":{"rendered":"https:\/\/www.jussimetso.com\/?p=1728"},"modified":"2025-01-18T20:57:14","modified_gmt":"2025-01-18T18:57:14","slug":"ai-llm-attacks-how-part-2","status":"publish","type":"post","link":"https:\/\/www.jussimetso.com\/index.php\/2025\/01\/18\/ai-llm-attacks-how-part-2\/","title":{"rendered":"AI LLM attacks\u00a0&amp; how &#8211; Part 2"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1728\" class=\"elementor elementor-1728\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fb36e8f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb36e8f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c243346\" data-id=\"c243346\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f2971b elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"4f2971b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;exclude_headings_by_selector&quot;:[],&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;headings_by_tags&quot;:[&quot;h2&quot;,&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;,&quot;h6&quot;],&quot;marker_view&quot;:&quot;numbers&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h4 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__4f2971b\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-down\"><\/i><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__4f2971b\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><i aria-hidden=\"true\" class=\"fas fa-chevron-up\"><\/i><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__4f2971b\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<i class=\"elementor-toc__spinner eicon-animation-spin eicon-loading\" aria-hidden=\"true\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acf6bfb elementor-widget elementor-widget-text-editor\" data-id=\"acf6bfb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here&#8217;s the second part of my presentation in Microsoft AI Summit Finland on October 31st, 2024.<\/p><p>And some extra since this second part is so late. I blame finnish Hell, I mean the endless darkness\u00a0 from October to the end of January.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-416fb2e elementor-widget elementor-widget-heading\" data-id=\"416fb2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect AI workloads against  threats \n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2d86e8 elementor-widget elementor-widget-text-editor\" data-id=\"d2d86e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>So what does it mean? There are different tools\/applications to see what might happen to your AI applications and how they can protected proactively not reactively. Of course that can be done too but in worst scenario that is too late.\u00a0\u00a0<\/p><ul><li>Security teams can now detect new threats to AI workloads that use <b>Azure OpenAI Service<\/b><\/li><li>This includes threats such as <b>prompt injection attacks<\/b>, <b>credential theft<\/b>, and <b>sensitive data exfiltration<\/b><\/li><li>Enriched security alerts provide insights into <b>IP address, malicious prompt evidence <\/b>that triggered the alert<b>, <\/b>as well as details on<b> sensitive information types <\/b>or<b> credential accessed<\/b><\/li><li>In addition, <b>correlate them into incidents <\/b>in <b>Defender XDR <\/b>or integrate into their SIEM solution of choice<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0668867 elementor-widget elementor-widget-heading\" data-id=\"0668867\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Threat protection for AI workloads in Azure<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-499d0e6 elementor-widget elementor-widget-text-editor\" data-id=\"499d0e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Cloud has a new plan for AI workloads.<\/p><p>Threat protection for AI workloads in Azure involves a combination of security measures, services, and best practices that work together to safeguard data, models, and infrastructure.<\/p><p>Azure AI workloads threat protection can detect and respond to attacks, such as jailbreak attacks, sensitive data exposure, and credential theft.<\/p><p>It can also receive contextual security alerts with supporting evidence including:<\/p><ul><li>IP address<\/li><li>Malicious prompt evidence<\/li><li>Sensitive information types or credentials accessed.<\/li><\/ul><p>To enable threat protection for AI workloads:<\/p><ol><li><p>Sign in to the\u00a0<a href=\"https:\/\/portal.azure.com\/\" data-linktype=\"external\">Azure portal<\/a>.<\/p><\/li><li><p>Search for and select\u00a0<strong>Microsoft Defender for Cloud<\/strong>.<\/p><\/li><li><p>In the Defender for Cloud menu, select\u00a0<strong>Environment settings<\/strong>.<\/p><\/li><li><p>Select the relevant Azure subscription.<\/p><\/li><li><p>On the Defender plans page, toggle the AI workloads to\u00a0<strong>On<\/strong>.<\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab157dd elementor-widget elementor-widget-image\" data-id=\"ab157dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_workload_plan\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc3OCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX3dvcmtsb2FkX3BsYW4ucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"24\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?fit=640%2C24&amp;ssl=1\" class=\"attachment-large size-large wp-image-1778\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?w=2317&amp;ssl=1 2317w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?resize=300%2C11&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?resize=1024%2C39&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?resize=768%2C29&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?resize=1536%2C58&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?resize=2048%2C78&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?resize=850%2C32&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click image to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a110564 elementor-widget elementor-widget-image\" data-id=\"a110564\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan_details.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_workload_plan_details\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc3OSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX3dvcmtsb2FkX3BsYW5fZGV0YWlscy5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"237\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan_details.png?fit=640%2C237&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-1779\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan_details.png?w=805&amp;ssl=1 805w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan_details.png?resize=300%2C111&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_plan_details.png?resize=768%2C284&amp;ssl=1 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">AI workloads plan details<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-16f0404 elementor-widget elementor-widget-text-editor\" data-id=\"16f0404\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Also <\/strong>with the AI workloads threat protection plan enabled, you can control whether alerts include suspicious segments directly from your user&#8217;s prompts, or the model responses from your AI applications or resources. Enabling user prompt evidence helps you to triage and classify alerts and your user&#8217;s intentions.<\/p><p>User prompt evidence consists of prompts and model responses. Both are considered your data. Evidence is available through the Azure portal, Defender portal, and any attached partners integrations.<\/p><ol><li><p>Sign in to the\u00a0<a href=\"https:\/\/portal.azure.com\/\" data-linktype=\"external\">Azure portal<\/a>.<\/p><\/li><li><p>Search for and select\u00a0<strong>Microsoft Defender for Cloud<\/strong>.<\/p><\/li><li><p>In the Defender for Cloud menu, select\u00a0<strong>Environment settings<\/strong>.<\/p><\/li><li><p>Select the relevant Azure subscription.<\/p><\/li><li><p>Locate AI workloads and select\u00a0<strong>Settings<\/strong>.<\/p><\/li><li><p>Toggle Enable user prompt evidence to\u00a0<strong>On<\/strong>.<\/p><\/li><\/ol><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5443fca elementor-widget elementor-widget-image\" data-id=\"5443fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_workload_monitoring\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc5MiwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX3dvcmtsb2FkX21vbml0b3JpbmcucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"54\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?fit=640%2C54&amp;ssl=1\" class=\"attachment-large size-large wp-image-1792\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?w=2287&amp;ssl=1 2287w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?resize=300%2C26&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?resize=1024%2C87&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?resize=768%2C65&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?resize=1536%2C131&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?resize=2048%2C175&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?resize=850%2C72&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_workload_monitoring.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc203aa elementor-widget elementor-widget-text-editor\" data-id=\"fc203aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here\u2019s how threat protection typically works for AI workloads in Azure:<\/p><p><strong>Defender for Cloud<\/strong>\u00a0continuously monitors Azure resources and provides <strong>security recommendations<\/strong> and alerts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40a7df4 elementor-widget elementor-widget-image\" data-id=\"40a7df4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"185\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_mdc_recommendations.png?fit=640%2C185&amp;ssl=1\" class=\"attachment-large size-large wp-image-1776\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_mdc_recommendations.png?w=825&amp;ssl=1 825w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_mdc_recommendations.png?resize=300%2C87&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_mdc_recommendations.png?resize=768%2C222&amp;ssl=1 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Defender for Cloud recommendations for AI resources.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9546283 elementor-widget elementor-widget-text-editor\" data-id=\"9546283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It uses advanced analytics and machine learning to detect threats, such as unusual activity patterns that could indicate a security breach.<\/p><p><strong>Monitoring and Logging<\/strong>: Azure Monitor and Azure Log Analytics provide visibility into the health, performance, and security of your AI workloads. They enable you to collect logs and metrics from your resources, facilitating proactive threat detection and troubleshooting.<\/p><p>Below is an example of AI Alert which can see from Defender for Cloud:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8996a6a elementor-widget elementor-widget-image\" data-id=\"8996a6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_azure_threat_protection_alert\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc3NywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX2F6dXJlX3RocmVhdF9wcm90ZWN0aW9uX2FsZXJ0LnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"361\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?fit=640%2C361&amp;ssl=1\" class=\"attachment-large size-large wp-image-1777\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?w=1632&amp;ssl=1 1632w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?resize=1024%2C577&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?resize=1536%2C865&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?resize=850%2C479&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_threat_protection_alert.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f44a7b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4f44a7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcd104f elementor-widget elementor-widget-heading\" data-id=\"fcd104f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Threat protection for AI workloads in Defender XDR<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e68a15b elementor-widget elementor-widget-text-editor\" data-id=\"e68a15b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Threat protection for AI workloads <b>integrates with\u00a0Defender XDR<\/b>, enabling security teams to centralize alerts on AI workloads within the Defender XDR portal.<\/p><p><b>Correlate and contextualize malicious events <\/b>into robust security incidents with XDR and SIEM tool integrations.<\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/ai-threat-protection#availability\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Availibility<\/span><\/a> at the moment is limited. You can request access <a href=\"https:\/\/aka.ms\/D4AI\/PublicPreviewAccess\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">limited public preview program<\/span><\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd74ccc elementor-widget elementor-widget-image\" data-id=\"bd74ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_defenderxdr_alert\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc4MCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX2RlZmVuZGVyeGRyX2FsZXJ0LnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"366\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?fit=640%2C366&amp;ssl=1\" class=\"attachment-large size-large wp-image-1780\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?w=2124&amp;ssl=1 2124w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?resize=300%2C172&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?resize=1024%2C586&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?resize=768%2C440&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?resize=1536%2C879&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?resize=2048%2C1172&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?resize=850%2C487&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_defenderxdr_alert.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security. Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca5b5c5 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ca5b5c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b40ad44 elementor-widget elementor-widget-heading\" data-id=\"b40ad44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Summary for AI Threat Protection<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15da8a4 elementor-widget elementor-widget-text-editor\" data-id=\"15da8a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Cloud enables organizations to securely develop, deploy and run Gen-AI applications across the applications lifecycle and multiple cloud environments.<\/p><p><b>Security Posture for AI <\/b>&#8211; agentless ability to discover and reduce risks to GenAI enterprise-built applications in Azure and AWS from code to cloud using new recommendations, attack path analysis and Infrastructure as code scanning (shift left) to discover AI related misconfigurations and vulnerable code repositories.<\/p><p><b>Threat Protection for AI <\/b>&#8211; agentless ability to detect and respond to attacks targeting Gen-AI cloud native applications in Azure with seamless integration with Azure AI, Microsoft Threat Intelligence and Defender XDR.<\/p><p>Defender for Cloud mission is to empower organizations to secure the entire lifecycle of their cloud native applications.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f95007 elementor-widget elementor-widget-image\" data-id=\"4f95007\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_protect_genai\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc5MCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX3Byb3RlY3RfZ2VuYWkucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"334\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?fit=640%2C334&amp;ssl=1\" class=\"attachment-large size-large wp-image-1790\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?w=2481&amp;ssl=1 2481w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?resize=300%2C156&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?resize=1024%2C534&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?resize=768%2C400&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?resize=1536%2C801&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?resize=2048%2C1067&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?resize=850%2C443&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_protect_genai.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security. Click to enlarge<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b13a372 elementor-widget elementor-widget-heading\" data-id=\"b13a372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Azure AI Foundry<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89fa4d2 elementor-widget elementor-widget-text-editor\" data-id=\"89fa4d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Azure AI Foundry &#8211; Safety and security measures help AI systems avoid harmful content, bias, misuse, and unintended risks. Prioritizing safety and security empowers you to build AI solutions that your enterprise and your customers can trust. <a href=\"https:\/\/ai.azure.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>https:\/\/ai.azure.com\/<\/strong><\/span><\/a><\/p><p>It is designed for developers to:<\/p><ul><li>Build generative AI applications on an enterprise-grade platform.<\/li><li>Explore, build, test, and deploy using cutting-edge AI tools and ML models, grounded in responsible AI practices.<\/li><li>Collaborate with a team for the full life-cycle of application development.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8eeb8fc elementor-widget elementor-widget-image\" data-id=\"8eeb8fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_content_safety\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc4NiwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX2NvbnRlbnRfc2FmZXR5LnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"599\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?fit=640%2C599&amp;ssl=1\" class=\"attachment-large size-large wp-image-1786\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?w=1582&amp;ssl=1 1582w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?resize=300%2C281&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?resize=1024%2C958&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?resize=768%2C718&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?resize=1536%2C1437&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?resize=850%2C795&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_content_safety.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Azure AI Foundry - Safety + security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e8e468 elementor-widget elementor-widget-text-editor\" data-id=\"3e8e468\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Azure AI Foundry has a possibility to create Content Filters. It works by running both the prompt input and completion output through an ensemble of classification models aimed at detecting and preventing the output of harmful content.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7917002 elementor-widget elementor-widget-image\" data-id=\"7917002\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_foundry_content_filters\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTgwNSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX2ZvdW5kcnlfY29udGVudF9maWx0ZXJzLnBuZyJ9\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"303\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?fit=640%2C303&amp;ssl=1\" class=\"attachment-large size-large wp-image-1805\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?w=2989&amp;ssl=1 2989w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?resize=300%2C142&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?resize=1024%2C484&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?resize=768%2C363&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?resize=1536%2C726&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?resize=2048%2C968&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?resize=850%2C402&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_foundry_content_filters.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Azure AI Foundry - Safety + Security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea3b679 elementor-widget elementor-widget-heading\" data-id=\"ea3b679\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Uses cases for software developers<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cd16e4 elementor-widget elementor-widget-text-editor\" data-id=\"2cd16e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>User prompts submitted to a generative AI service.<\/li><li>Content produced by generative AI models.<\/li><li>Online marketplaces that moderate product catalogs and other user-generated content.<\/li><li>Gaming companies that moderate user-generated game artifacts and chat rooms.<\/li><li>Social messaging platforms that moderate images and text added by their users.<\/li><li>Enterprise media companies that implement centralized moderation for their content.<\/li><li>K-12 education solution providers filtering out content that is inappropriate for students and educators.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0c858f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e0c858f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cb765d elementor-widget elementor-widget-heading\" data-id=\"0cb765d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Azure AI Content Safety Studio<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02b73a4 elementor-widget elementor-widget-text-editor\" data-id=\"02b73a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Cloud&#8217;s AI threat protection works with\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/content-safety\/concepts\/jailbreak-detection\" target=\"_blank\" rel=\"noopener\" data-linktype=\"absolute-path\"><span style=\"text-decoration: underline;\">Azure AI Content Safety Prompt Shields<\/span><\/a>\u00a0and Microsoft&#8217;s threat intelligence to provide security alerts for threats like data leakage, data poisoning, jailbreak, and credential theft.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b05afd elementor-widget elementor-widget-image\" data-id=\"8b05afd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/threat_protection_for_ai_workloads.gif?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"threat_protection_for_ai_workloads\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc4NSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL3RocmVhdF9wcm90ZWN0aW9uX2Zvcl9haV93b3JrbG9hZHMuZ2lmIn0%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2048\" height=\"1248\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/threat_protection_for_ai_workloads.gif?fit=2048%2C1248&amp;ssl=1\" class=\"attachment-2048x2048 size-2048x2048 wp-image-1785\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security (but I did the animation). Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-752ab8b elementor-widget elementor-widget-text-editor\" data-id=\"752ab8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Azure AI Content Safety Studio is an own web site, <a href=\"https:\/\/contentsafety.cognitive.azure.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">https:\/\/contentsafety.cognitive.azure.com\/<\/span><\/a><\/p><p>It is an online tool designed to handle potentially offensive, risky, or undesirable content using cutting-edge content moderation ML models. It provides templates and customized workflows, enabling users to choose and build their own content moderation system. Users can upload their own content or try it out with provided sample content.<\/p><p>Content Safety Studio not only contains out-of-the-box AI models but also includes\u00a0<strong>Microsoft&#8217;s built-in terms blocklists<\/strong>\u00a0to flag profanities and stay up to date with new content trends. You can also upload your own blocklists to enhance the coverage of harmful content that&#8217;s specific to your use case.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f29eb6a elementor-widget elementor-widget-image\" data-id=\"f29eb6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_azure_ai_content_safety_templates\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc4NywidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX2F6dXJlX2FpX2NvbnRlbnRfc2FmZXR5X3RlbXBsYXRlcy5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"399\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?fit=640%2C399&amp;ssl=1\" class=\"attachment-large size-large wp-image-1787\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?w=2101&amp;ssl=1 2101w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?resize=300%2C187&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?resize=1024%2C639&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?resize=768%2C480&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?resize=1536%2C959&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?resize=2048%2C1279&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?resize=850%2C531&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_azure_ai_content_safety_templates.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Templates from Azure AI Content Safety Studio<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbeb719 elementor-widget elementor-widget-heading\" data-id=\"fbeb719\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Product templates and use-cases<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d800e9f elementor-widget elementor-widget-text-editor\" data-id=\"d800e9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Azure AI Content Safety product templates are described <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/content-safety\/overview#product-features\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">here<\/span><\/a>. These links take you to Microsoft Learn pages.<\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/content-safety\/concepts\/jailbreak-detection\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Prompt Shields<\/strong><\/span><\/a><\/p><p>Prompt Shields is a technique designed to enhance the safety and reliability of AI language models. It involves creating a series of defensive mechanisms, like filters and checks, that are applied to the prompts and outputs of an AI model. These mechanisms aim to prevent the model from generating harmful, biased, or otherwise undesirable content.<\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/content-safety\/concepts\/groundedness\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Groundedness detection (preview)<\/strong><\/span><\/a><\/p><p>Groundedness detection in the context of AI language models refers to the ability of the model to evaluate whether its responses are based on factual, reliable, and verifiable information. This is particularly important for applications where accuracy and trustworthiness are crucial, such as in education, healthcare, or news dissemination.<\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/content-safety\/concepts\/protected-material?tabs=text\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Protected material detection (preview)<\/strong><\/span><\/a><\/p><div role=\"listitem\"><div class=\"ms-Stack css-177\"><div class=\"ms-Stack css-177\" data-is-focusable=\"true\"><div class=\"ms-Stack css-177\" aria-atomic=\"true\"><div class=\"ms-StackItem css-206\" data-automation-id=\"chatBubble\"><div class=\"___1b62ws1 fzwmq1w f19gb1f4 fj3n01z f1acs6jw f9ijwd5 css-307\" aria-description=\"user\" data-automation-id=\"card-body\"><div class=\"content-308\">Protected material detection refers to the process of identifying and managing content that is legally or ethically sensitive, such as copyrighted, confidential, or private information. In the context of AI and machine learning, this involves ensuring that AI models do not inadvertently generate or replicate such material, which could lead to legal issues or breaches of privacy.<\/div><\/div><\/div><\/div><\/div><\/div><\/div><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/content-safety\/concepts\/custom-categories?tabs=standard\" target=\"_blank\" rel=\"noopener\"><strong>Custom categories (preview)<\/strong><\/a><\/span><\/p><p>Azure AI Content Safety lets you create and manage your own content moderation categories for enhanced moderation and filtering that matches your specific policies or use cases.<\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/content-safety\/concepts\/harm-categories?tabs=warning\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Harm categories<\/strong><\/span><\/a><\/p><p>Here are some common harm categories: (more on MS learn)<\/p><ul><li>Race, ethnicity, nationality<\/li><li>Gender identity groups and expression<\/li><li>Sexual orientation<\/li><li>Religion<\/li><li>Personal appearance and body size<\/li><li>Disability status<\/li><li>Harassment and bullying<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36ffd8b elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"36ffd8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3a68691 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a68691\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b741ff1\" data-id=\"b741ff1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6dabc40 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6dabc40\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20dc10f\" data-id=\"20dc10f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a94d4c1 elementor-widget elementor-widget-heading\" data-id=\"a94d4c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure App Development\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1388a6d elementor-widget elementor-widget-text-editor\" data-id=\"1388a6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft provides comprehensive code to runtime security. \u200b<\/p><p>Starting with secure development, we have native security controls infused in the existing developer workflows to help you code and build applications securely\u200b.<\/p><p>With contextual posture management, we help you prioritize and reduce risk continuously across the entire cloud application lifecycle. \u200b<\/p><p>Protect your clouds against evolving threats with near real-time detections for cloud and AI workloads, data and APIs in a unified XDR experience where you can enable correlation and advanced Copilot powered response actions across your entire digital estate.\u200b<\/p><p>AppSec = Application Security (code scanning, supply chain security)\u200b<\/p><p>CI\/CD security = security for the developer and DevOps environments\u200b<\/p><p>CSPM = Cloud security posture management\u200b<\/p><p>CIEM = Cloud identity entitlement management\u200b<\/p><p>CWP = Cloud workload protection\u200b<\/p><p>CDR = Cloud detection and response\u200b<\/p><p>SDL = Security Development Lifecycle<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6e4d37 elementor-widget elementor-widget-image\" data-id=\"d6e4d37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_secure_development\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc4OCwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX3NlY3VyZV9kZXZlbG9wbWVudC5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"374\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?fit=640%2C374&amp;ssl=1\" class=\"attachment-large size-large wp-image-1788\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?w=2431&amp;ssl=1 2431w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?resize=300%2C176&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?resize=1024%2C599&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?resize=768%2C450&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?resize=1536%2C899&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?resize=2048%2C1199&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?resize=850%2C498&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_secure_development.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2e27bb elementor-widget elementor-widget-text-editor\" data-id=\"d2e27bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Here (below) we can see how AI-Security Posture Management can provide visibility into your GenAI stack and your connected resources to reduce misconfiguration that can expose sensitive grounding data<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f7a5ad elementor-widget elementor-widget-image\" data-id=\"5f7a5ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?ssl=1\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"ai_strenghten_ai_posture\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTc4OSwidXJsIjoiaHR0cHM6XC9cL3d3dy5qdXNzaW1ldHNvLmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyNVwvMDFcL2FpX3N0cmVuZ2h0ZW5fYWlfcG9zdHVyZS5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"349\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?fit=640%2C349&amp;ssl=1\" class=\"attachment-large size-large wp-image-1789\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?w=2596&amp;ssl=1 2596w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?resize=300%2C164&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?resize=1024%2C559&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?resize=768%2C419&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?resize=1536%2C838&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?resize=2048%2C1118&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?resize=850%2C464&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_strenghten_ai_posture.png?w=1920&amp;ssl=1 1920w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security. Click to enlarge.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0ca0c1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f0ca0c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ff8ac5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ff8ac5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dada7bd\" data-id=\"dada7bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7cf80d5 elementor-widget elementor-widget-heading\" data-id=\"7cf80d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Microsoft  AI RED Teaming &amp; Tools\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-077a451 elementor-widget elementor-widget-text-editor\" data-id=\"077a451\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft AI red teaming refers to the practice of emulating real-world adversaries and their tools, tactics, and procedures to identify risks, uncover blind spots, validate assumptions, and improve the overall security posture of systems. AI systems inherit new security vulnerabilities, such as prompt injection and poisoning, which need special attention. AI Red teaming is a best practice in the responsible development of systems and features using LLMs.<\/p><p>AI Red teamers help to uncover and identify harms and, in turn, enable measurement strategies to validate the effectiveness of mitigations.<\/p><p><strong>AI red teaming is now an umbrella term for both security and Responsible AI (RAI).<\/strong><\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3471439 elementor-widget elementor-widget-image\" data-id=\"3471439\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"643\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_redteam_history.png?fit=640%2C643&amp;ssl=1\" class=\"attachment-large size-large wp-image-1791\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_redteam_history.png?w=831&amp;ssl=1 831w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_redteam_history.png?resize=300%2C301&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_redteam_history.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/ai_redteam_history.png?resize=768%2C772&amp;ssl=1 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: Microsoft Security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efd26a9 elementor-widget elementor-widget-text-editor\" data-id=\"efd26a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Open automation framework, <a href=\"https:\/\/github.com\/Azure\/PyRIT\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">PyRIT<\/span><\/a> can help automate the process of identifying risks in AI systems.<\/p><p><b><a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/aibugbar?rtc=1\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Bug Bar<\/span> \u2013 <\/a><\/b><a href=\"https:\/\/www.microsoft.com\/msrc\/aibugbar\">Vulnerability Severity Classification<\/a>\u00a0<\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/engineering\/threat-modeling-aiml?toc=%2Fsecurity%2Fai-red-team%2Ftoc.json&amp;bc=%2Fsecurity%2Fai-red-team%2Fbreadcrumb%2Ftoc.json\" target=\"_blank\" rel=\"noopener\">Threat Modeling AI\/ML Systems and Dependencies<\/a><\/span><\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/engineering\/failure-modes-in-machine-learning\" target=\"_blank\" rel=\"noopener\">Adversarial Machine Learning Threat Taxonomy<\/a><\/span><\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/ai-red-team\/ai-risk-assessment\" target=\"_blank\" rel=\"noopener\">AI Risk Assessment for ML Engineers\u00a0<\/a><\/span> &#8211; Find out the severity levels in ML models<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23857d1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"23857d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4632ce1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4632ce1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-145165a\" data-id=\"145165a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c79f2cd elementor-widget elementor-widget-heading\" data-id=\"c79f2cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Copilot<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6633539 elementor-widget elementor-widget-text-editor\" data-id=\"6633539\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Then there is Security Copilot. I will cover this more on coming blog which is a refresher for my <a href=\"https:\/\/www.jussimetso.com\/index.php\/2023\/12\/03\/microsoft-security-copilot-can-your-soc-live-without-it\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">previous<\/span><\/a> one.\u00a0Here&#8217;s some<strong> use cases<\/strong> what you can do with it:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-625d5c0 elementor-widget elementor-widget-text-editor\" data-id=\"625d5c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Incident summarization<\/strong> &#8211; Gain context for incidents and improve communication across your organization by leveraging generative AI to swiftly distill complex security alerts into concise, actionable summaries<\/li><li><strong>Impact analysis<\/strong> &#8211; Utilize AI-driven analytics to assess the potential impact of security incidents, offering insights into affected systems and data to prioritize response efforts effectively.<\/li><li><strong>Reverse engineering of scripts<\/strong> &#8211; Eliminate the need to manually reverse engineer malware and enable every analyst to understand the actions executed by attackers.<\/li><li><strong>Analyze<\/strong> complex command line scripts and translate them into natural language with clear explanations of actions. Efficiently extract and link indicators found in the script to their respective entities in your environment.<\/li><li><strong>Guided response<\/strong> &#8211; Receive actionable step-by-step guidance for incident response, including directions for triage, investigation, containment, and remediation. Relevant deep links to recommended actions allow for quicker response.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3283ea elementor-widget elementor-widget-image\" data-id=\"e3283ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"411\" src=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?fit=640%2C411&amp;ssl=1\" class=\"attachment-large size-large wp-image-1798\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?w=1930&amp;ssl=1 1930w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?resize=300%2C193&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?resize=1024%2C658&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?resize=768%2C493&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?resize=1536%2C987&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?resize=850%2C546&amp;ssl=1 850w, https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/security-copilot-prompts-to-try.png?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e23a214 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e23a214\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fc9e9e4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fc9e9e4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7aff0cc\" data-id=\"7aff0cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65768a5 elementor-widget elementor-widget-heading\" data-id=\"65768a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Useful links<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c217eee elementor-widget elementor-widget-text-editor\" data-id=\"c217eee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?sort-by=newest-oldest&amp;topic%5B0%5D=ai-and-machine-learning&amp;topic%5B1%5D=threat-intelligence&amp;date=any&amp;s=\" target=\"_blank\" rel=\"noopener\">AI &amp; Machine Learning protection posts on Microsoft blog<\/a><\/span><\/p><p><span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/04\/11\/how-microsoft-discovers-and-mitigates-evolving-attacks-against-ai-guardrails\/\" target=\"_blank\" rel=\"noopener\">How Microsoft discovers and mitigates evelving attacks against AI guardrails<\/a><\/span><\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/alerts-ai-workloads\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Alerts for AI workloads<\/span><\/a><\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/openai\/concepts\/red-teaming\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Redteaming Large Language models (LLMs)<\/span><\/a><\/p><p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/02\/22\/announcing-microsofts-open-automation-framework-to-red-team-generative-ai-systems\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">PyRIT Framework blog<\/span><\/a><\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/ai-services\/openai\/concepts\/red-teaming?toc=%2Fsecurity%2Fai-red-team%2Ftoc.json&amp;bc=%2Fsecurity%2Fai-red-team%2Fbreadcrumb%2Ftoc.json\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Guide for building AI red teams for LLMs<\/span><\/a><\/p><p><a href=\"https:\/\/github.com\/Azure\/PyRIT\/blob\/main\/doc\/how_to_guide.ipynb\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">PyRIT &#8211; how to guide<\/span><\/a><\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/copilot\/security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">What is Security Copilot<\/span><\/a><\/p><p><a href=\"https:\/\/learn.microsoft.com\/en-us\/training\/paths\/security-copilot-and-ai\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">MS Learn training path for Security Copilot<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34e4156 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"34e4156\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fef14bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fef14bb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e59504b\" data-id=\"e59504b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6908ed elementor-widget elementor-widget-heading\" data-id=\"c6908ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key take-aways\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-135391b elementor-widget elementor-widget-text-editor\" data-id=\"135391b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>For infrastructure:<\/strong><\/p><ul><li>Secure your identity (with EntraID policies) &#8211; \u201dIdentity is the new Firewall\u201d<\/li><li>Enable security guardrails in your AI environment<\/li><li>Use AI Security Posture Management in Azure<\/li><li>Use Content Safety filters in Azure Open AI<\/li><\/ul><p><strong>For developers:<\/strong><\/p><ul><li>Require system developers to ensure that safety brakes are built by design into the use of AI systems for the control of infrastructure<\/li><li><a href=\"https:\/\/www.microsoft.com\/en-us\/securityengineering\/sdl\/practices\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Use Microsoft SDL (Security Development Lifecycle)\u00a0<\/span><\/a><\/li><li>Use vulnerability scanners against\u00a0 code repositories<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95ed625 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"95ed625\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ee99fb elementor-widget elementor-widget-heading\" data-id=\"5ee99fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Summary<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99ce196 elementor-widget elementor-widget-text-editor\" data-id=\"99ce196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Year 2024 was definitely the year of AI. Yet there are practises that take some AI solution to production but does not secure it in any way. That can cost a lot. We security people need to secure them or at least give guidance to the company decision-makers that AI solutions <span style=\"text-decoration: underline;\"><strong>MUST BE PROTECTED<\/strong><\/span>.<\/p><p>Here\u2019s a list of some of the significant AI-related incidents and attacks:<\/p><ol><li><strong>Microsoft Tay (2016)<\/strong>: Tay was an AI chatbot released by Microsoft on Twitter, designed to learn from interactions with users. However, it was quickly manipulated by users who fed it offensive and inappropriate content, leading Tay to produce racist and inflammatory tweets.<\/li><li><strong>Deepfake Technology (2018-present)<\/strong>: The rise of deepfake technology, which uses AI to create realistic fake videos, has led to numerous incidents where individuals have been impersonated, often in damaging ways. High-profile cases include deepfakes of political figures and celebrities.<\/li><li><strong>Tesla Autopilot Incidents (Various Years)<\/strong>: Tesla&#8217;s Autopilot system, an AI-driven driver assistance feature, has been involved in several accidents. Critics have pointed out that the system can be tricked or misused, leading to dangerous situations.<\/li><li><strong>Adversarial Attacks on Image Recognition (2010s-present)<\/strong>: Researchers have demonstrated that AI image recognition systems can be fooled by adversarial attacks, where slight, often imperceptible modifications to images lead the AI to make incorrect classifications.<\/li><li><strong>Amazon Alexa and Google Home Privacy Concerns (2017-present)<\/strong>: Incidents involving smart speakers like Amazon Alexa and Google Home have raised concerns about unintended recordings and data privacy. There have been reports of these devices capturing conversations without explicit activation.<\/li><li><strong>GPT-3 Misuse (2020-present)<\/strong>: OpenAI&#8217;s GPT-3, a powerful language model, has been used in various applications, some of which have raised ethical concerns. Misuse includes generating fake news articles, phishing emails, and other misleading content.<\/li><li><strong>AI in Social Media Manipulation (2010s-present)<\/strong>: AI-driven bots and algorithms have been used to manipulate social media platforms, spreading misinformation, and amplifying specific political agendas. Notable incidents include involvement in elections and public opinion manipulation.<\/li><li><strong>Data Poisoning Attacks (Various Years)<\/strong>: These attacks involve deliberately injecting malicious data into the training datasets of machine learning models, causing them to learn incorrect or harmful behaviors.<\/li><li><strong>Facial Recognition Misidentification (2010s-present)<\/strong>: There have been numerous reports of facial recognition technology misidentifying individuals, leading to wrongful arrests and privacy violations. This has raised concerns about bias and accuracy in AI systems.<\/li><li><strong>AI in Autonomous Weapons (Ongoing Concerns)<\/strong>: While not a specific incident, the potential misuse of AI in autonomous weapons systems has been a significant concern for ethicists and governments, leading to calls for regulation and bans on certain applications.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a07780 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7a07780\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Here&#8217;s the second part of my Microsoft AI Summit Finland speak written in blog mode.<\/p>\n","protected":false},"author":1,"featured_media":1796,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[27,7],"tags":[],"class_list":["post-1728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.jussimetso.com\/wp-content\/uploads\/2025\/01\/A-red-umbrella-which-is-covering-all-the-helpless-assets-in-darkness-e1737212692473.png?fit=512%2C512&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pes24X-rS","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/comments?post=1728"}],"version-history":[{"count":27,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1728\/revisions"}],"predecessor-version":[{"id":1814,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/posts\/1728\/revisions\/1814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media\/1796"}],"wp:attachment":[{"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/media?parent=1728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/categories?post=1728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jussimetso.com\/index.php\/wp-json\/wp\/v2\/tags?post=1728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}