19

Maturing AI Security

Throughout this book, we’ve examined the threats that are posed by adversarial AI and considered practical mitigations. In the previous two chapters, we incorporated these threats and mitigations into a more holistic AI application security approach by using a secure-by-design AI methodology and applying MLSecOps to embed AI security throughout the life cycle. These are essential steps to safeguard AI solutions, but their effectiveness will depend on how well they integrate with the broader enterprise AI security. This aligns with the organization’s goals, security standards, and compliance requirements. This alignment ensures that AI security is not a siloed endeavor but a well-integrated part of the organization’s overall ...

Get Adversarial AI Attacks, Mitigations, and Defense Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.