3 Ways to Stop Unauthorized Code From Running in Your Network

3 Ways to Stop Unauthorized Code From Running in Your Network

November 22, 2023 at 12:03PM

More than 50% of organizations plan to incorporate AI and automation technologies in 2023. However, the development of code using AI tools needs to be closely monitored to prevent unauthorized code from running in networks. Three steps to prevent this include requiring secure code-signing certificates, implementing self-replicating security architectures, and aligning on the owner of safe code deployment. Failure to do so can leave organizations vulnerable to cybercriminals.

From the meeting notes, the following key takeaways can be observed:

1. Incorporation of AI and automation technologies: More than 50% of organizations plan to integrate AI and automation technologies by 2023, according to Deloitte. This highlights the growing significance of AI in various industries.

2. Risks related to AI-developed code: Organizations are increasingly utilizing AI-developed code, but precautions need to be taken to prevent unauthorized code from running in their networks. The evolution of malicious code poses significant cybersecurity risks that must be addressed.

3. Importance of secure code-signing certificates: Traditional code signing is no longer sufficient to protect organizations, especially when AI is involved. Secure code-signing certificates are required to guarantee the legitimacy of the code and mitigate potential vulnerabilities.

4. Self-replicating security architectures: With the shift to cloud-native environments, security architectures need to adapt and be self-replicating to keep pace with the changing threat landscape. Visibility into networks and control over activity, permissions, and usage are crucial for effective security management.

5. Safety and authorization of code: To ensure that only authorized code is being used, organizations need to align on the owner of safe code deployment. The software’s author typically signs the code, but with the involvement of multiple teams, clarity is necessary to avoid confusion and potential risks.

6. Planning for the future: As security and business leaders plan for the future, they should consider necessary precautions and tools to ensure the running of only authorized code, thereby mitigating major cyber risks.

These takeaways highlight the importance of addressing the risks associated with AI-developed code, implementing secure code-signing practices, and fostering collaboration between security, IT, and developer teams to ensure the safety and legitimacy of code deployed within organizations.

Full Article