Revolutionizing AI Security and Cyber Resilience with Open-Source Innovation and Risk Management Solutions

Revolutionizing AI Security and Cyber Resilience with Open-Source Innovation and Risk Management Solutions

Foundation AI: Open-Source Innovations for Secure AI To address new and complex cybersecurity challenges introduced by the rapid adoption of artificial intelligence (AI), Cisco launches Foundation AI, a team of leading experts in AI and cybersecurity. This group is fully dedicated to solving major security challenges of the AI era by developing advanced tools and technologies that tackle these core issues. This new approach reflects the pressing need to balance rapid AI adoption with robust…

Read More

Foundation AI: Robust Intelligence for Cybersecurity

Foundation AI: Robust Intelligence for Cybersecurity

Today, we’re announcing a new organization at Cisco Security with a distinct mission. The team is called Foundation AI, and its mission is to create transformational AI technology for cybersecurity applications. The team has been hard at work for the past six months, since the acquisition of Robust Intelligence, on which it is based. In this post, we’ll describe the problem Foundation AI seeks to solve, guiding principles, and share some of the products it…

Read More

Foundation-sec-8b: Cisco Foundation AI’s First Open-Source Security Model

Foundation-sec-8b: Cisco Foundation AI’s First Open-Source Security Model

Cisco is proud to mark a major milestone in its AI journey. Our newly launched Foundation AI group—formed to bring world-class, domain-specific AI infrastructure to the cybersecurity space—is proud to introduce its first release: Llama-3.1-FoundationAI-SecurityLLM-base-8B (Foundation-sec-8b), an 8-billion parameter, open-weight Large Language Model (LLM) purpose-built for security. This model combines deep domain expertise with the flexibility and control needed for secure, real-world deployment. With Foundation-sec-8B, teams can build, fine-tune, and deploy AI-native workflows across the…

Read More

Does Your SSE Understand User Intent?

Does Your SSE Understand User Intent?

Enhanced Data Protection With AI Guardrails With AI apps, the threat landscape has changed. Every week, we see customers are asking questions like: How do I mitigate leakage of sensitive data into LLMs? How do I even discover all the AI apps and chatbots users are accessing? We saw how the Las Vegas Cybertruck bomber used AI, so how do we avoid toxic content generation? How do we enable our developers to debug Python code…

Read More

Developers Beware: Slopsquatting & Vibe Coding Can Increase Risk of AI-Powered Attacks

Developers Beware: Slopsquatting & Vibe Coding Can Increase Risk of AI-Powered Attacks

Security researchers and developers are raising alarms over “slopsquatting,” a new form of supply chain attack that leverages AI-generated misinformation commonly known as hallucinations. As developers increasingly rely on coding tools like GitHub Copilot, ChatGPT, and DeepSeek, attackers are exploiting AI’s tendency to invent software packages, tricking users into downloading malicious content. What is slopsquatting? The term slopsquatting was originally coined by Seth Larson, a developer with the Python Software Foundation, and later popularized by…

Read More

Embracing the AI Era: Cisco Secure AI Factory with NVIDIA

Embracing the AI Era: Cisco Secure AI Factory with NVIDIA

In today’s fast-paced digital landscape, the ability to harness the power of artificial intelligence (AI) is essential. At Cisco, we are empowering organizations worldwide to seamlessly integrate AI into their business operations, ensuring they remain at the forefront of innovation and security.  Our collaboration with NVIDIA will mark a significant milestone in this journey, introducing a groundbreaking new AI infrastructure that puts security and flexibility at its core. A Strategic Leap Forward  As we announced…

Read More

Harnessing AI to Simplify Cloud Configuration Drift Detection

Harnessing AI to Simplify Cloud Configuration Drift Detection

Cloud environments are dynamic by nature; they frequently change and update configurations. Unless these changes are carefully tracked, they could lead to configuration drift, a situation in which the runtime state of a resource deviates from its intended baseline configuration. Configuration drift can have severe consequences, potentially introducing security vulnerabilities, degrading system performance, and violating compliance requirements.  Manual configuration drift management in large, multi-cloud environments is inefficient and prone to human error. AI helps to…

Read More

5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025

5 Emerging AI Threats Australian Cyber Pros Must Watch in 2025

Australian cybersecurity professionals can expect threat actors to exploit artificial intelligence to diversify tactics and scale the volume of cyberattacks targeting organisations in 2025, according to security tech firm Infoblox. Last year, cyber teams in APAC witnessed the first signs of AI being used to execute crimes like financial fraud, while some have linked AI to a DDoS attack in the financial services sector in Australia. This year, Australia’s cyber defenders can expect AI to…

Read More

Why Secure Networks are the key to a Successful AI-Powered Factory

Why Secure Networks are the key to a Successful AI-Powered Factory

Cisco Blogs / Manufacturing / Why Secure Networks are the key to a Successful AI-Powered Factory AiOps plays a major role in the uptime and innovation of a manufacturer. I recently recorded a webinar delving into how manufacturers can enhance their speed, precision, process optimization and cybersecurity using AI-native IT solutions. The discussion offered valuable insights into the future and best practices of AI in the manufacturing industry. In this session, Paul Didier and I…

Read More

5 Reasons Why Developers Should Attend Security Conferences

5 Reasons Why Developers Should Attend Security Conferences

On the first night of BlackHat USA, I made conversation with a few friendly penetration testers who were perplexed when I told them I was a developer. Why would I be at a cybersecurity conference? …What was I hoping to get out of it? My general (and perhaps vague) response to them, and to others I’d meet who would be perplexed by my attendance at both BlackHat and DefCon, was that I wanted a better…

Read More
1 2