❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

AI’s front door: Why the browser is your most critical control point

26 November 2025 at 10:46

Enterprise security has a dark secret, one that threatens to undermine the multibillion dollar investments being made in artificial intelligence. Organizations have spent countless hours building fortified castles to protect their AI models and data lakes. Yet every day, the primary interface to these powerful systems β€” the browser β€” remains an uncontrolled and unlocked front door.

Security leaders have rightly focused on securing the core of their AI infrastructure. Their focus, however, has often missed the most common point of interaction: the browser, a tool now transformed into a direct threat to innovation by the explosion of generative AI.

For all intents and purposes, the browser is the proverbial β€œfront door” of the AI journey, the dynamic space where human ingenuity and machine intelligence converge. Unfortunately, leaving this front door ajar places a hard ceiling on the potential of an organization’s most strategic initiatives.

Fresh wave of browser-borne risks

The adoption of generative AI has introduced a new class of threats that are born and executed within the browser, far beyond the reach of traditional network security. The scale of this new risk is staggering. A recent internal study among our customers showed that GenAI traffic is up over 890% in 2024. Consequently, data security incidents related to GenAI had more than doubled.

These are not theoretical exploits; they are happening now, and one of the most common is the inadvertent exposure of sensitive data. For example, a well-meaning product manager, trying to summarize internal research, pastes confidential details about an upcoming product launch into a public LLM prompt. In that instant, sensitive intellectual property has been used to train a third-party model, with no visibility or control.

The risks, though, extend far beyond data leakage. Malicious prompt injection, where an attacker crafts a query to trick AI into performing an unauthorized action, is another growing threat. Imagine an AI-powered customer support bot, accessed through a standard web browser, being manipulated by a malicious prompt to reveal another customer’s personal information. These are serious application-layer attacks that exploit the trusted interface of the browser and put billions of data records at risk.

New architecture of control

To combat these new, browser-borne threats, the enterprise browser itself must become the new architecture of control. This is its new mandate: to evolve from a simple access tool into a sophisticated security platform, providing the deep visibility and granular control required to safely enable the widespread use of AI.

The foundation for this platform begins with a fundamental shift to a zero trust framework that extends to the browser itself β€” where all activity context is visible. This framework enforces rigorous device posture checks and continuous trust verification before granting access to any application. It means having the power to enforce a new standard of more granular digital hygiene directly at the point of interaction. This includes the ability to dynamically mask sensitive data within prompts, prevent unauthorized screenshots of sensitive data and manage file transfers to block uploads of intellectual property to personal drives. The framework creates a secure workspace within the browser, protecting business applications from web-based threats and compromised endpoints.

For too long, the browser has been the unspoken vulnerability in our security strategies. By transforming it into an intelligent control point, we categorically address this β€œdark secret.” Securing this critical avenue closes an important security gap and unlocks the full potential of AI. It provides the confidence needed to empower employees, accelerate development, and build the next wave of innovation safely.

The browser goes beyond just being the front door. It is also the foundation for enabling AI with confidence and control. See what the browser can do for you.

Curious about what else Anand has to say? Check out his other articles on Perspectives.

What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware

2 January 2020 at 06:00

The need to achieve responsible enterprise security has taken center stage in enterprise IT management in recent years, precipitated by a deluge of public data breaches that damaged company reputations. However, lacking information on the most critical modern attack vectors, many organizations continue to rely solely on traditional virus scanning tools as their sole method of enabling endpoint security.

Many business professionals seem to cling to a common misconception that the implementation of a malware protection tool provides blanket protection against all potential security risks. The broad availability of free scanning tools and Window’s native Defender software has lulled individuals who are not particularly risk-conscious into a false sense of security when it comes to protecting their IT resources.

To be clear, it is certainly true that scanning and remediation tools for malware β€” including viruses, Trojans, ransomware and adware β€” continue to be critical components of any security arsenal. According to Enterprise Management Associates (EMA) research, 73 percent of surveyed organizations indicated they have been affected by a malware attack, and only 58 percent reported a high level of confidence that they can detect a malware incident before it causes a business-impacting event.

These challenges are only accelerating due to a new generation of advanced malware attacks that are designed to target specific environments or conditions and are more resistant to removal or cleanup. However, it is important to recognize that these threats represent only a portion of the total risks posed by the use of endpoint devices in modern business environments.

Learn more about endpoint security and mobile threat defense

Modern Endpoint Security Attack Vectors

Beyond the threat of malware infection, the broad reliance on distributed endpoint devices β€” including desktops, laptops, tablets, smartphones and wearables β€” poses a number of challenges to enterprise security assuredness. In traditional environments, endpoint devices (primarily desktops) and the applications and data they utilized were kept contained on controlled business networks.

Today, however, critical business IT services are distributed across numerous public and private cloud, web, and server-hosting environments. Additionally, the β€œmobile revolution,” which began a decade ago, introduced more portable endpoint devices, allowing users to access business IT services from any location at any time. The consequence of these foundational changes to IT service delivery is that there is no longer a secure perimeter within which business devices, applications and data can be protected. Instead, all IT services must be considered continuously at risk.

Unfortunately, many bad actors are far ahead of the curve in figuring out how to exploit a world of interconnected and poorly secured software and devices. Cryptojacking is a prime example of this. It occurred to some resourceful individuals that it would be much cheaper and easier to secretly leverage the processing power of millions of end-user devices by embedding code in common websites to perform free cryptocurrency mining activities, rather than to purchase and manage a dedicated server farm for this purpose.

As a result, the performance of business devices and, by extension, the productivity of business workers are being diminished to line the pockets of clandestine entrepreneurs. Additionally, the eminent portability of the most commonly used endpoint devices (tablets and smartphones) further reduces their inherent security. EMA research indicated that one out of every eight mobile devices and one out of every 20 laptops containing business data ends up lost or stolen.

These are only two examples of rapidly evolving endpoint security challenges that plague enterprise operations teams, and this trend is expected to accelerate with cyberterrorists leveraging the power of intelligence technologies such as machine learning to identify new weaknesses they can exploit.

The Biggest Threat to Endpoint Security

EMA recently noted that the most frequent consequence of a security breach is not a malware infection, but compromised business data. We live in an age when information is a commodity that can be bought and sold through both legal markets and shadowy outlets. The latter, of course, is the greater concern with critical data β€” such as user access credentials, Social Security numbers, bank account information and other sensitive information β€” regularly being auctioned on the dark web. Cyberattacks are no longer designed just to be a nuisance; they are the cornerstone of a high revenue-generating industry.

There are three principal methods through which data is compromised on an endpoint:

  1. The first is through the use of invasive software, such as hidden code in applications and websites that collect and distribute data to remote systems without the knowledge of the users.
  2. The second involves manipulating users into unwittingly granting nefarious actors’ access to devices and IT resources. This is most frequently accomplished with the use of phishing schemes that employ psychological inventiveness rather than technological proficiency.
  3. The final method for compromising data on endpoint devices occurs when the user distributes the information themselves in an unsecure manner.

A Responsible Approach to Endpoint Security

Antivirus and other malware protection solutions can certainly help protect endpoint devices from related attacks, but they do very little natively to prevent data loss from other attack vectors. To responsibly ensure endpoint devices can securely perform business tasks, organizations must adopt a multifaceted approach to security that continuously monitors for inappropriate device activities and effectively controls access to enterprise data and resources.

To enable holistic visibility, configuration, status and contextual information should be collected on devices, processes and network activities. Intelligence technologies, such as analytics, language processing and machine learning, should be applied to collected details so that any potential security risks can be rapidly identified, and policy-based automated responses can be immediately implemented.

Of course, enterprise data is not a risk at all if it is never removed from secured locations in the first place. This can be accomplished with the use of resource isolation technologies, such as containerization, app wrapping, virtualization and browser isolation solutions. Data access and distribution controls are also enhanced with the introduction of strong identity and access management (IAM) capabilities. IAM platforms that are risk-based and governed by policy controls provide a strong first line of defense in any security implementation, particularly if they holistically leverage device information collected by endpoint and security management tools, as well as common intelligence technologies to accurately determine the level of risk associated with allowing an access event to occur.

Unified endpoint management (UEM) solutions designed to support all endpoints across an entire IT ecosystem offer the optimal platform from which to manage a diverse range of security processes. Comprehensive UEM solutions centrally support capabilities for data collection, reporting and alarming, data analysis, and automated response that are the hallmark of a responsible endpoint security approach. Solutions in this field are greatly advantaged if they can extend their security management capabilities through direct integrations with related platforms or by enabling integrations with the use of an API.

Effective endpoint security management requires a broad spectrum of key functionality that goes far beyond just malware detection, but with the right resources in place, organizations can ensure the secure utilization of enterprise IT services without unnecessarily limiting workforce productivity.

Discover new approaches to endpoint security

The post What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware appeared first on Security Intelligence.

❌
❌