{"id":15947,"date":"2023-09-25T14:30:00","date_gmt":"2023-09-25T14:30:00","guid":{"rendered":"https:\/\/www.walkme.com\/blog\/?p=15947"},"modified":"2023-09-25T14:30:00","modified_gmt":"2023-09-25T14:30:00","slug":"ai-security","status":"publish","type":"post","link":"https:\/\/www.walkme.com\/blog\/ai-security\/","title":{"rendered":"AI Security: The measures you can take"},"content":{"rendered":"\n<p>\u201cAI security\u201d describes the security risks and possibilities related to Artificial Intelligence.&nbsp;<\/p>\n\n\n\n<p>People have been working with AI security for many years. However, thanks to the rise of <a href=\"https:\/\/www.walkme.com\/glossary\/generative-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">generative AI<\/a>, the problems and opportunities have exploded. Although many people are excited about using AI, we must remember that it brings many issues.\u00a0<\/p>\n\n\n\n<p>Fortunately, many agencies are working hard to understand how to use AI securely and how to use AI to create better security systems.&nbsp;<\/p>\n\n\n\n<p>This article will introduce this difficult topic &#8211; focussing on risk reduction. <strong>It will explain:&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>the meaning of \u201cAI security\u201d (in detail);&nbsp;<\/li><li>the main risks of poor AI security;&nbsp;<\/li><li>The steps to improve AI security.&nbsp;<\/li><\/ul>\n\n\n\n<p>Security risks have been on business leaders\u2019 minds in the past few years. With the rise of the <a href=\"https:\/\/www.walkme.com\/blog\/digital-workplace\/\" target=\"_blank\" rel=\"noreferrer noopener\">digital workplace<\/a> and its benefits, we\u2019ve also seen many new security challenges. AI is yet another way for security vulnerabilities to enter your systems &#8211; so let&#8217;s look at how to improve everything.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What does AI security mean?<\/strong><\/h2>\n\n\n\n<p>\u201cAI security\u201d is a catch-all expression for the relationship between AI and security. Although we are focussing on the negative elements in this article, \u201cAI Security\u201d includes the risks <em>and <\/em>the opportunities for AI.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"504\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-security-includes__57650192.jpg?w=1024&#038;h=504&#038;crop=1\" alt=\"AI security includes_\" class=\"wp-image-15951\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-security-includes__57650192.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-security-includes__57650192.jpg?resize=300,148 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-security-includes__57650192.jpg?resize=1024,504 1024w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>AI security includes:&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>The security of AI systems<\/strong>. Is your LLM safe from attacks? If someone inputs confidential information, will it remain safe? Within your business, are people using AI technology in approved ways?&nbsp;&nbsp;<\/li><li><strong>The use of AI in security systems<\/strong>. Can AI be effectively mobilized in security systems?&nbsp;<\/li><li><strong>The threat of AI to security systems<\/strong>. How will your online data be protected from malicious AI attacks? Do you have adequate cyber defense to prevent AI intrusions?<\/li><\/ul>\n\n\n\n<p>Just as people are wising up to the opportunities of AI, leaders are also starting to see how these technologies could create a lot of problems within their organizations.&nbsp;<\/p>\n\n\n\n<p>If we don\u2019t pay attention to AI security now, it will only worsen. A <a href=\"https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/cybersecurity\/cybersecurity-trends-looking-over-the-horizon\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2022 McKinsey forecast<\/a> reflected that AI would embolden hackers in particular: \u201cOver the next several years, they will be able to expedite\u2014from weeks to days or hours\u2014the end-to-end attack life cycle, from reconnaissance through exploitation.\u201d\u00a0<\/p>\n\n\n\n<p>Whatever the nature of the attack, you can\u2019t afford to take any chances. So, let\u2019s take a look at some of the major risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The risks of poor AI security\u00a0<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"701\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-risks-of-poor-AI-security_07650192.jpg?w=1024&#038;h=701&#038;crop=1\" alt=\"The risks of poor AI security\" class=\"wp-image-15950\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-risks-of-poor-AI-security_07650192.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-risks-of-poor-AI-security_07650192.jpg?resize=300,206 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-risks-of-poor-AI-security_07650192.jpg?resize=1024,701 1024w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>AI security is not just one issue: using AI brings many security risks. This section will briefly introduce some of the main AI security problems. Some of these problems will be more relevant for your organization than others. You can use this list for an initial assessment of your needs.&nbsp;<\/p>\n\n\n\n<p><strong>Some of the major problems in AI technologies include:&nbsp;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Leaking confidential information. <\/strong>With all of generative AI&#8217;s amazing capabilities, it&#8217;s tempting to trust the chat box with all kinds of sensitive data. This is a bad idea, as the LLMs behind most AI chatbots use that input as training data. If your employees use AI tools carelessly, they may give away important secrets about your company or clients.\u00a0<\/li><li><strong>AI hallucinations<\/strong>. By now, we&#8217;re all familiar with the nonsense that AI models sometimes produce. ChatGPT will happily fabricate a completely false answer if it doesn&#8217;t know something. That&#8217;s fine if you&#8217;re just having fun. But if you rely on AI output for your business dealings, you&#8217;re opening the door to a world of pain. And by the time you realize it, it might already be too late.\u00a0<\/li><li><strong>Input manipulation and prompt injection attacks. <\/strong>This is a cyber threat within the models themselves at the top of the AI supply chain. Cyber attackers use the input prompts to trick the model into generating biased, harmful, or unintended content. By exploiting vulnerability in prompt-based AI systems, attackers can spread misinformation, hate speech, or malicious content, undermining the model&#8217;s reliability and trustworthiness. Fortunately, experts are discovering more ways to protect AI systems from this manipulation.\u00a0<\/li><li><strong>Shadow AI<\/strong>. The new term <a href=\"https:\/\/www.walkme.com\/blog\/shadow-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Shadow AI<\/a> refers to the use of unauthorized AI systems by employees. When staff members independently find a way for an AI system to make their work faster &#8211; they are probably not thinking about the security threats they are opening up. Shadow AI is especially challenging because no one understands the limitations of Generative AI capabilities. Until we do, some IT leaders may temporarily ban AI software within their companies.\u00a0<\/li><li><strong>Data poisoning<\/strong> involves introducing malicious or misleading data during the training process. This can compromise the model&#8217;s performance, leading to inaccurate predictions or security vulnerabilities. Attackers can manipulate AI systems, making them less reliable and potentially causing real-world harm or exploitation.<\/li><li><strong>Model theft.<\/strong> This is another problem for the artificial intelligence systems themselves. It is a critical concern in AI security because it involves unauthorized access to and duplication of proprietary machine learning models. Malicious actors can steal these models to avoid the time and cost of development, potentially using them for malicious purposes or financial gain. This theft can erode a company&#8217;s competitive advantage, jeopardize intellectual property, and undermine trust in AI systems.<\/li><\/ul>\n\n\n\n<p>AI security is still a relatively small part of the puzzle in the big picture of digital business infrastructure. Even in April 2023, AI was hardly mentioned in <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/04-12-2023-gartner-identifies-the-top-cybersecurity-trends-for-2023\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Gartner\u2019s top cybersecurity risks<\/a> for the year. Even if AI is just one area among many risks, it\u2019s still important for people to address AI-specific security measures as part of their wider security programs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The steps for improving security in your business AI systems\u00a0<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img height=\"606\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-steps-for-improving-security-in-your-business-AI-systems_93650191.jpg?w=1024&#038;h=606&#038;crop=1\" alt=\"The steps for improving security in your business AI systems\" class=\"wp-image-15949\" width=\"1024\" srcset=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-steps-for-improving-security-in-your-business-AI-systems_93650191.jpg 1200w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-steps-for-improving-security-in-your-business-AI-systems_93650191.jpg?resize=300,178 300w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-steps-for-improving-security-in-your-business-AI-systems_93650191.jpg?resize=1024,606 1024w, https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/The-steps-for-improving-security-in-your-business-AI-systems_93650191.jpg?resize=245,145 245w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>So &#8211; how do we solve the problem of AI security? The IT world is still developing the best answers. However, we can already see that improving AI security takes good leadership, technical developments, and sensitive staff training. So, let\u2019s see how this works.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to lead improvements in AI security&nbsp;<\/strong><\/h3>\n\n\n\n<p>Simply put, leaders have to take responsibility for potential security threats. The personnel involved will be different at every company. But the conversations about AI risk need to start soon.&nbsp;<\/p>\n\n\n\n<p>Often, you will need to include surprising new policies into your leadership. For example, any company working closely with technology should introduce a policy for bringing \u201cShadow AI\u201d into your general business architecture. If you\u2019ve got a <a href=\"https:\/\/change.walkme.com\/what-is-prompt-engineering\/\" target=\"_blank\" rel=\"noreferrer noopener\">budding prompt engineer <\/a>on your team, you need to know the right checks and balances have been made prior to a roll-out.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Technical improvements to your AI System<\/strong><\/h3>\n\n\n\n<p>The technological solutions for AI risks are slowly emerging. Some of the techniques you can apply include:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Establish a robust security foundation for AI, drawing parallels with existing threats to software and data.&nbsp;<\/li><li>Implement advanced detection mechanisms and response protocols to address potential malicious AI activities.<\/li><li>Automate defensive measures to promptly mitigate AI-related attacks and vulnerabilities.<\/li><li>Implement organization-wide security controls at the platform level to ensure comprehensive protection.<\/li><li>Foster agility by conducting frequent testing, responding effectively to crises, and staying adaptable to emerging threats.<\/li><li>Gain a deep understanding of your organization&#8217;s AI usage patterns to identify and address vulnerabilities proactively.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Achieving best practices from your employees&nbsp;<\/strong><\/h3>\n\n\n\n<p>Finally, make sure that your staff is well-prepared for the challenges of cyber threats. Don&#8217;t let human error be the main weakness in generative AI systems! As we&#8217;ve said above, you may need to restrict access to AI within your workplace &#8211; this doesn\u2019t feel great, but it might be necessary.&nbsp;<\/p>\n\n\n\n<p>Appropriate training in the main software systems and security operations could make a major difference. When staff are more knowledgeable about the risks of cyber attacks, complacent AI misuse, and human error, they will have actionable insights to change their behavior.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Artificial Intelligence: problems with solutions&nbsp;<\/strong><\/h2>\n\n\n\n<p>The world is quickly discovering the best and worst of AI. The <a href=\"https:\/\/change.walkme.com\/learning-curve\" target=\"_blank\" rel=\"noreferrer noopener\">digital learning curve<\/a> for these products is remarkably quick, but with security hazards that most users don\u2019t understand.<\/p>\n\n\n\n<p>The major technology companies are catching up &#8211; providing organizations with the defense strategies they need to avoid the potentially severe consequences. IBM, Google&#8217;s SAIF, and even <a href=\"https:\/\/news.mit.edu\/2023\/educating-national-security-leaders-ai-0630\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">research institutions like MIT<\/a> are all taking the lead that the digital world requires.\u00a0<\/p>\n\n\n<a href=\"javascript:;\" class=\"popup-threefields m-element-hidden j-initiator j-paid_post_feature\" id=\"imgpng\" form-type-id=\"imgpng\"><img decoding=\"async\" class=\"initiator-image\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/04\/Digital-adoption-A-min_72643bf2.png\"\/><\/a>\n","protected":false},"excerpt":{"rendered":"\u201cAI security\u201d describes the security risks and possibilities related to Artificial Intelligence.&nbsp; People have been working with AI security for<span class=\"moretag\">&#8230;<\/span>","protected":false},"author":246,"featured_media":15948,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"mobile_image_id":0,"tablet_image_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89],"tags":[8025,8027,8032,8024,8002],"class_list":["post-15947","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-transformation","tag-ai-security","tag-digital-learning-curve","tag-digital-workplace-3","tag-generative-ai-2","tag-shadow-ai"],"acf":{"__coauthors":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI Security: The measures you can take - WalkMe Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.walkme.com\/blog\/ai-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Security: The measures you can take - WalkMe Blog\" \/>\n<meta property=\"og:description\" content=\"\u201cAI security\u201d describes the security risks and possibilities related to Artificial Intelligence.&nbsp; People have been working with AI security for...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.walkme.com\/blog\/ai-security\/\" \/>\n<meta property=\"og:site_name\" content=\"WalkMe Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-25T14:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"583\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WalkMe Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WalkMe Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.walkme.com\/blog\/ai-security\/\",\"url\":\"https:\/\/www.walkme.com\/blog\/ai-security\/\",\"name\":\"AI Security: The measures you can take - WalkMe Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/ai-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/ai-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg\",\"datePublished\":\"2023-09-25T14:30:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/ai-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.walkme.com\/blog\/ai-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/ai-security\/#primaryimage\",\"url\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg\",\"contentUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg\",\"width\":1200,\"height\":583,\"caption\":\"AI Security_ The measures you can take\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.walkme.com\/blog\/ai-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.walkme.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Transformation\",\"item\":\"https:\/\/www.walkme.com\/blog\/category\/digital-transformation\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI Security: The measures you can take\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\",\"url\":\"https:\/\/www.walkme.com\/blog\/\",\"name\":\"WalkMe Blog\",\"description\":\"Digital adoption &amp; Change Management Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.walkme.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31\",\"name\":\"WalkMe Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g\",\"caption\":\"WalkMe Team\"},\"description\":\"WalkMe pioneered the Digital Adoption Platform (DAP) for organizations to utilize the full potential of their digital assets. Using artificial intelligence, machine learning and contextual guidance, WalkMe adds a dynamic user interface layer to raise the digital literacy of all users.\",\"url\":\"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Security: The measures you can take - WalkMe Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.walkme.com\/blog\/ai-security\/","og_locale":"en_US","og_type":"article","og_title":"AI Security: The measures you can take - WalkMe Blog","og_description":"\u201cAI security\u201d describes the security risks and possibilities related to Artificial Intelligence.&nbsp; People have been working with AI security for...","og_url":"https:\/\/www.walkme.com\/blog\/ai-security\/","og_site_name":"WalkMe Blog","article_published_time":"2023-09-25T14:30:00+00:00","og_image":[{"width":1200,"height":583,"url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","type":"image\/jpeg"}],"author":"WalkMe Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"WalkMe Team","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.walkme.com\/blog\/ai-security\/","url":"https:\/\/www.walkme.com\/blog\/ai-security\/","name":"AI Security: The measures you can take - WalkMe Blog","isPartOf":{"@id":"https:\/\/www.walkme.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.walkme.com\/blog\/ai-security\/#primaryimage"},"image":{"@id":"https:\/\/www.walkme.com\/blog\/ai-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","datePublished":"2023-09-25T14:30:00+00:00","author":{"@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31"},"breadcrumb":{"@id":"https:\/\/www.walkme.com\/blog\/ai-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.walkme.com\/blog\/ai-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/ai-security\/#primaryimage","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","contentUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","width":1200,"height":583,"caption":"AI Security_ The measures you can take"},{"@type":"BreadcrumbList","@id":"https:\/\/www.walkme.com\/blog\/ai-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.walkme.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Digital Transformation","item":"https:\/\/www.walkme.com\/blog\/category\/digital-transformation\/"},{"@type":"ListItem","position":3,"name":"AI Security: The measures you can take"}]},{"@type":"WebSite","@id":"https:\/\/www.walkme.com\/blog\/#website","url":"https:\/\/www.walkme.com\/blog\/","name":"WalkMe Blog","description":"Digital adoption &amp; Change Management Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.walkme.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31","name":"WalkMe Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g","caption":"WalkMe Team"},"description":"WalkMe pioneered the Digital Adoption Platform (DAP) for organizations to utilize the full potential of their digital assets. Using artificial intelligence, machine learning and contextual guidance, WalkMe adds a dynamic user interface layer to raise the digital literacy of all users.","url":"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/walkme.com\/blog\/ai-security\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"AI Security: The measures you can take","url":"http:\/\/www.walkme.com\/blog\/ai-security\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/www.walkme.com\/blog\/ai-security\/"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","image":{"@type":"ImageObject","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg"},"articleSection":"Digital Transformation","author":[{"@type":"Person","name":"WalkMe Team"}],"creator":["WalkMe Team"],"publisher":{"@type":"Organization","name":"WalkMe Blog","logo":""},"keywords":["ai security","digital learning curve","digital workplace","generative ai","shadow ai"],"dateCreated":"2023-09-25T14:30:00Z","datePublished":"2023-09-25T14:30:00Z","dateModified":"2023-09-25T14:30:00Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"AI Security: The measures you can take\",\"url\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/ai-security\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/ai-security\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/AI-Security_-The-measures-you-can-take_70650191.jpg\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/09\\\/AI-Security_-The-measures-you-can-take_70650191.jpg\"},\"articleSection\":\"Digital Transformation\",\"author\":[{\"@type\":\"Person\",\"name\":\"WalkMe Team\"}],\"creator\":[\"WalkMe Team\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"WalkMe Blog\",\"logo\":\"\"},\"keywords\":[\"ai security\",\"digital learning curve\",\"digital workplace\",\"generative ai\",\"shadow ai\"],\"dateCreated\":\"2023-09-25T14:30:00Z\",\"datePublished\":\"2023-09-25T14:30:00Z\",\"dateModified\":\"2023-09-25T14:30:00Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/walkme.com\/p.js"},"lang":"en","translations":{"en":15947},"jetpack_featured_media_url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","featured_image_src":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","featured_image_src_square":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/09\/AI-Security_-The-measures-you-can-take_70650191.jpg","author_info":{"display_name":"WalkMe Team","author_link":"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/"},"jetpack_sharing_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/15947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/users\/246"}],"replies":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/comments?post=15947"}],"version-history":[{"count":0,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/15947\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media\/15948"}],"wp:attachment":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media?parent=15947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/categories?post=15947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/tags?post=15947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}