Artificial Intelligence and Machine Learning. Now available Threat Modeled.
It is a privilege to be a software user in 2023, with advanced Machine Learning (ML) and Artificial Intelligence (AI) at our disposal. Ways of working can be made smarter, organizations and teams can be more effective - but only if they are using it correctly - and securing it appropriately.

What is 'Secure by Design'?
Is your software secure by design? And what does that really mean? ‘Secure by design’ is a proactive approach to software and product development that emphasizes incorporating security measures from the very beginning of the design phase, rather than trying to add security features as an afterthought.
This methodology aligns closely with the principles of threat modeling, a critical aspect of building secure software.

Software must be secure - no exceptions.
The Cybersecurity Infrastructure and Security Agency (CISA) stated in August; Software Must Be Secure by Design, and Artificial Intelligence Is No Exception. ‘...CISA will continue to urge technology providers to ensure AI systems are Secure by Design – every model, every system, every time.’ At IriusRisk we take security seriously, and secure by design is in the lifeblood of our product. This is why we have developed a Security Library for threat modeling AI and ML.

Product
Get immediate access to the Security Library.
We have just launched the first of its kind, ML/AI Security Library, so that our clients can use it to effectively threat model the security of their AI or ML systems and applications. We are passionate about secure design, and we believe in our product so much that the Library is available in both our free-forever version; Community Edition, and our Enterprise Threat Modeling Tool. You will see currently 12 specific components in this collection. Get access to Community Edition, for free, now.

Blog
Learn more about AI Threat Modeling and Securing your ML or AI systems.
To read more about this Library and the importance of threat modeling your entire risk architecture, take a look at this blog, by one of our SMEs and Security Researchers, who actually worked on the creation of the AI/ ML Security Library!
Webinar
Join our upcoming fireside discussion with AI Experts.
See how threat modeling ML/AI applications gets you ahead in your risk posture management, and hear directly from those involved in compliance, machine learning and artificial intelligence systems.

If you would like additional advice from others experiencing the same challenges, why not head over to Threat Modeling Connect, a global community where threat modeling practitioners collaborate, share, and grow. Here you will find some conversations have already begun regarding secure software best practice.
Other articles you may be interested in
Securing ML/AI Systems and Applications
Machine Learning and Artificial Intelligence (ML/AI) are now at the epicenter of a digital world that is increasingly becoming data- and analytics-driven. However, technological developments do not only come with opportunities, they also introduce new risks and challenges to the security posture of applications and systems.
Effectively Securing the Software Supply Chain
Software supply chains are growing larger and more complex by the day, involving many third-party vendors and components that are absolutely in need of greater attention for both their visibility and security. In this article, we covered key aspects to effectively secure the supply chain, from SBOMs to guidelines and frameworks for security enhancement and hardening.
Free demo
Get a free, no obligation demonstration of the IriusRisk Threat Modeling Platform and see how you can improve.