<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Market trends - Erium</title>
	<atom:link href="https://www.erium.fr/en/category/tendances-du-marche-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.erium.fr/en/category/tendances-du-marche-en/</link>
	<description>Activez tous vos potentiels cyber.</description>
	<lastBuildDate>Thu, 28 Nov 2024 15:45:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://www.erium.fr/wp-content/uploads/2024/03/cropped-miniature-site-1-32x32.png</url>
	<title>Market trends - Erium</title>
	<link>https://www.erium.fr/en/category/tendances-du-marche-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Generative Artificial Intelligence: What Risks?</title>
		<link>https://www.erium.fr/en/generative-artificial-intelligence-what-risks/</link>
		
		<dc:creator><![CDATA[contact@erium.fr]]></dc:creator>
		<pubDate>Mon, 11 Dec 2023 13:06:30 +0000</pubDate>
				<category><![CDATA[Market trends]]></category>
		<guid isPermaLink="false">https://www.erium.fr/?p=2711</guid>

					<description><![CDATA[<p>Chat GPT, Bard, MidJourney, DALL-E, and other similar technologies offer new opportunities, but they also present new risks. Four months after the European Parliament adopted the AI Act, the European Union Agency for Cybersecurity (ENISA) has released a report warning about the risks associated with generative AI. As AI continues to play an increasingly prominent [&#8230;]</p>
<p>The post <a href="https://www.erium.fr/en/generative-artificial-intelligence-what-risks/">Generative Artificial Intelligence: What Risks?</a> appeared first on <a href="https://www.erium.fr/en/homepage-v2">Erium</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Chat GPT, Bard, MidJourney, DALL-E, and other similar technologies offer new opportunities, but they also present new risks.</p>



<p>Four months after the European Parliament adopted the AI Act, the <a href="https://www.enisa.europa.eu/">European Union Agency for Cybersecurity (ENISA)</a> has released a report warning about the risks associated with generative AI. As AI continues to play an increasingly prominent role in our daily lives, the risks associated with this emerging technology are not always well understood.</p>



<h2 class="wp-block-heading"><br>An ever-increasing role</h2>



<p><br>Artificial intelligence is playing an increasingly significant role in our daily lives. Chat GPT, which is capable of generating text based on the questions asked to it, is an excellent example of this.</p>



<p>This conversational AI developed by OpenAI has become the fastest-growing consumer application in history. According to UBS, Chat GPT had 100 million active users just two months after its launch, a milestone that even the viral social network TikTok took 9 months to achieve.</p>



<p>However, despite its popularity, users are not always aware of the risks it poses. In March 2023, Chat GPT was taken offline for several hours due to a serious data breach involving sensitive user information.</p>



<h2 class="wp-block-heading"><br>The European Union is legislating</h2>



<p>Faced with the widespread phenomenon of generative AI, such as Chat GPT or its Google counterpart, Bard, the European Parliament adopted the AI Act on Wednesday, June 14, 2023. This is a regulatory text for AI aimed at creating a regulatory framework for market deployment with a focus on issues of security, health, and fundamental rights.</p>



<p>In its report dated October 19, 2023, the European Union Agency for Cybersecurity (ENISA) also identified and warned against several typologies of risks associated with AI. It particularly highlights the increase in cyberattacks.</p>



<h2 class="wp-block-heading">More sophisticated attacks</h2>



<p><br>Indeed, with AI, cyberattacks can be more effective as they become more realistic and operate on a larger scale.</p>



<p>The era of smishing attempts (phishing via SMS) or phishing emails filled with spelling mistakes and inconsistencies is a thing of the past. With generative AI, cybercriminals can prepare more convincing scams. The same applies to phone scams: with the development of deepfakes, they can impersonate other individuals by cloning their voices!</p>



<h2 class="wp-block-heading">Some risks to data</h2>



<p>The risks associated with generative AI also lie in the information entrusted to these tools. It is essential to be vigilant about what is requested from them, as they <a href="https://www.erium.fr/en/ai-and-privacy-denial/">do not guarantee the confidentiality of this data.</a></p>



<p>Samsung recently experienced this firsthand when employees allegedly entered confidential and strategic information into Chat GPT. As with any generative AI, this information was then transformed into training data for the AI to improve the accuracy of its future responses. This information could then be shared with other users outside the company to answer their questions.</p>



<p>Corporate secrets just a click away, and one can easily imagine the devastating impacts if they were to fall into the hands of a malicious individual.</p>



<p></p>
<p>The post <a href="https://www.erium.fr/en/generative-artificial-intelligence-what-risks/">Generative Artificial Intelligence: What Risks?</a> appeared first on <a href="https://www.erium.fr/en/homepage-v2">Erium</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI and Privacy Denial</title>
		<link>https://www.erium.fr/en/ai-and-privacy-denial/</link>
		
		<dc:creator><![CDATA[Arnaud Le Men]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 15:08:15 +0000</pubDate>
				<category><![CDATA[Market trends]]></category>
		<guid isPermaLink="false">https://www.erium.fr/?p=2565</guid>

					<description><![CDATA[<p>With availability, traceability, and integrity, confidentiality is one of the four pillars of computer security. However, with the acceleration of the opening of artificial intelligence services to the general public, confidentiality is one of the pillars that is most undermined. How does the emergence of Artificial Intelligence impact confidentiality? An essential principle of Artificial Intelligence [&#8230;]</p>
<p>The post <a href="https://www.erium.fr/en/ai-and-privacy-denial/">AI and Privacy Denial</a> appeared first on <a href="https://www.erium.fr/en/homepage-v2">Erium</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>With availability, traceability, and integrity, confidentiality is one of the four pillars of computer security. However, with the acceleration of the opening of artificial intelligence services to the general public, confidentiality is one of the pillars that is most undermined.</p>



<h2 class="wp-block-heading">How does the emergence of Artificial Intelligence impact confidentiality?</h2>



<p>An essential principle of Artificial Intelligence technologies is algorithm learning. For an artificial intelligence algorithm to fulfill its function, it first needs to learn what it should do.</p>



<p>Following a learning curve principle, the algorithm multiplies and optimizes the pathways that enable it to perform its functions.</p>



<p>This learning phase requires massive volumes of data that serve as its training ground. The sources of information are diverse and rely on the daily use of its services, which promotes a continuous improvement of the calculation mechanisms. By injecting data into the system, users contribute to the learning databases of the algorithms.</p>



<p>From a cybersecurity perspective, this is where the risk lies. The offered services are extremely user-friendly, and anyone can use them to input anything.</p>



<p>At the beginning of 2023, Cyberhaven conducted a study on the use of ChatGPT by employees of companies. Although alarming, the result is not surprising: 2.3% of employees have already copied confidential information into the AI software developed by OpenAI.</p>



<p>This reality raises questions about the usage rules of the services offered, especially in their free versions.</p>



<p>Looking back at 4 very popular solutions:</p>



<h2 class="wp-block-heading">ChatGPT &#8211; Text-generating AI developed by OpenAI (United States)</h2>



<p>You can apparently ask it anything: from drafting a document to translating a text into any language. To use the service, you just need to log in and type your question, and the algorithm responds immediately.</p>



<p>Does the service use your information?</p>



<p>According to the information provided in the &#8216;terms of use,&#8217; there are two scenarios. If the data comes from the API provided by OpenAI, then no, it does not use your information. However, if the data does not come from the API, then yes, it may use your information.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="605" height="146" src="https://www.erium.fr/wp-content/uploads/2023/11/terms-of-use-chatgpt.png" alt="" class="wp-image-2566" srcset="https://www.erium.fr/wp-content/uploads/2023/11/terms-of-use-chatgpt.png 605w, https://www.erium.fr/wp-content/uploads/2023/11/terms-of-use-chatgpt-300x72.png 300w" sizes="(max-width: 605px) 100vw, 605px" /></figure>



<p>The question is as follows: which services are non-API and which ones use the API? The answer can be found on OpenAI&#8217;s blog.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="888" height="655" src="https://www.erium.fr/wp-content/uploads/2023/11/data-model-performance.png" alt="" class="wp-image-2567" style="aspect-ratio:1.3557251908396946;width:840px;height:auto" srcset="https://www.erium.fr/wp-content/uploads/2023/11/data-model-performance.png 888w, https://www.erium.fr/wp-content/uploads/2023/11/data-model-performance-300x221.png 300w, https://www.erium.fr/wp-content/uploads/2023/11/data-model-performance-768x566.png 768w" sizes="(max-width: 888px) 100vw, 888px" /></figure>



<p><br>In conclusion, if you use the ChatGPT service, the well-known one, the default policy allows the editor to reserve the right to use the data you input into it.</p>



<p>However, there is a form provided by OpenAI to request that your data injected into the ChatGPT service not be utilized.</p>



<h2 class="wp-block-heading">MidJourney &#8211; Image generation AI on Discord (United States)</h2>



<p>MidJourney is an incredible algorithm. You provide it with textual instructions that it translates into images with impressive finesse and creativity. The operating principle is relatively simple. After creating an account, you log in to Discord to give artistic creation orders (referred to as /imagine prompt) in the form of keywords. You can also input a photo that belongs to you as input. Many users, in fact, input their own photos, including ID photos, family pictures, and party photos, to be modified by the algorithm.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="604" src="https://www.erium.fr/wp-content/uploads/2023/11/mid-journey-screen-1024x604.png" alt="" class="wp-image-2568" srcset="https://www.erium.fr/wp-content/uploads/2023/11/mid-journey-screen-1024x604.png 1024w, https://www.erium.fr/wp-content/uploads/2023/11/mid-journey-screen-300x177.png 300w, https://www.erium.fr/wp-content/uploads/2023/11/mid-journey-screen-768x453.png 768w, https://www.erium.fr/wp-content/uploads/2023/11/mid-journey-screen.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Does the service use your information?</p>



<p>Yes, without any restrictions, and this is explicitly mentioned in the article &#8216;Rights you give to MidJourney&#8217; in the terms of use of the service.</p>



<p>So, there is no ambiguity; if you submit information to MidJourney, the data becomes the property of MidJourney.</p>



<h2 class="wp-block-heading">DeepL &#8211; Language-to-Language Translation AI (Germany)</h2>



<p>A highly popular service, with its extremely user-friendly interface, DeepL is used by thousands of people every day to translate texts into various languages.</p>



<p>The usage is straightforward: you simply input a text and select the desired output language.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="523" src="https://www.erium.fr/wp-content/uploads/2023/11/deepl-1024x523.png" alt="" class="wp-image-2569" srcset="https://www.erium.fr/wp-content/uploads/2023/11/deepl-1024x523.png 1024w, https://www.erium.fr/wp-content/uploads/2023/11/deepl-300x153.png 300w, https://www.erium.fr/wp-content/uploads/2023/11/deepl-768x392.png 768w, https://www.erium.fr/wp-content/uploads/2023/11/deepl.png 1456w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Does the service use your information?</p>



<p>No and yes! The service does not retain the memory of the input texts, only if you use it in a paid Pro version. The free service, on the other hand, retains and reserves the right to utilize the injected data.</p>



<h2 class="wp-block-heading">ElevenLabs &#8211; Voice Generation AI (United States)</h2>



<p>ElevenLabs offers a voice generation service. By the end of March 2023, the service was made available to the public in a Beta version with a very simple interface.</p>



<p>Does the service use your information?</p>



<p>In its free version, yes, the injected data is retained and utilized by the service.</p>



<h2 class="wp-block-heading">To conclude</h2>



<p>Is AI a revolution, and will it become a permanent fixture in the digital landscape? Absolutely yes, it&#8217;s already the case, and it will continue to accelerate by offering more and more AI services to facilitate digital usage for both the general public and organizations. For instance, in March 2023, Microsoft announced the integration of OpenAI&#8217;s algorithms into its Azure environment and the integration of Copilot (another OpenAI solution) into the Microsoft Office 365 suite. This is an enduring trend.</p>



<p>However, the emergence of these new uses also comes with risks, particularly for data privacy. It is essential to remind users of best practices and raise awareness of the use of these tools:</p>



<ol class="wp-block-list">
<li>Do not upload a confidential document to be translated by an algorithm without knowing what happens to the source afterward.</li>



<li>Do not upload photos of third parties into a tool without their consent.</li>



<li>Do not ask an algorithm to process personal data without verifying their compatibility with GDPR and security policies.</li>
</ol>



<p>Beyond its undeniable contribution to data processing, artificial intelligence also provides internet users with the opportunity to exercise common sense and discernment.</p>



<p></p>
<p>The post <a href="https://www.erium.fr/en/ai-and-privacy-denial/">AI and Privacy Denial</a> appeared first on <a href="https://www.erium.fr/en/homepage-v2">Erium</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>BAS versus Red Team : how attack simulation alters the landscape</title>
		<link>https://www.erium.fr/en/bas-versus-red-team-how-attack-simulation-alters-the-landscape/</link>
		
		<dc:creator><![CDATA[Arnaud Le Men]]></dc:creator>
		<pubDate>Wed, 25 Oct 2023 12:27:29 +0000</pubDate>
				<category><![CDATA[Market trends]]></category>
		<guid isPermaLink="false">https://www.erium.fr/?p=2524</guid>

					<description><![CDATA[<p>To avoid any misunderstanding, it is not the intention here to advocate against Red Teams; quite the contrary. Erium has excellent Red Team partners. Red Team operations continue to serve as a benchmark for exposing businesses to the reality of cyber risk. However, the emerging methods of continuous SecOps enhancement through Breach &#38; Attack Simulation [&#8230;]</p>
<p>The post <a href="https://www.erium.fr/en/bas-versus-red-team-how-attack-simulation-alters-the-landscape/">BAS versus Red Team : how attack simulation alters the landscape</a> appeared first on <a href="https://www.erium.fr/en/homepage-v2">Erium</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>To avoid any misunderstanding, it is not the intention here to advocate against<a href="https://csrc.nist.gov/glossary/term/red_team"> Red Teams;</a> quite the contrary. Erium has excellent Red Team partners. Red Team operations continue to serve as a benchmark for exposing businesses to the reality of cyber risk. However, the emerging methods of continuous SecOps enhancement through Breach &amp; Attack Simulation solutions are increasingly challenging traditional Red Team approaches. But why?</p>



<h2 class="wp-block-heading">BAS highlights the vulnerabilities that Red Teams exploit</h2>



<p>The two approaches have different end goals.</p>



<p>The Red Team follows a path of compromise known as the &#8220;path of least resistance&#8221;: spending as little time as possible on the targeted infrastructure, leaving minimal traces, taking the shortest route, limiting movements, and so on.</p>



<p>By achieving its objective, it highlights very targeted and localized vulnerabilities that will subsequently be addressed. The BAS solution explores all conceivable paths, generating various levels of noise with the primary objective of verifying that what should be detected is indeed detected and effectively addressed by cyber teams.</p>



<p>In the process, the simulations produced by BAS highlight numerous failures, sometimes isolated, often overlooked, and easy to rectify. Here are a few examples:</p>



<p><br><strong>Regarding detection:</strong></p>



<ul class="wp-block-list">
<li>Failures or gaps in log collection and forwarding services (missing or faulty Syslog)</li>



<li>Limitations in log strategy (log type, retention period, etc.)</li>



<li>Misconfigurations in SIEM correlation scenario settings (inappropriate or inactive rules)</li>



<li>Failure to detect a specific action by an EDR that should have detected it</li>



<li>Failure or absence of alerts from detection consoles (SIEM, EDR, etc.)</li>



<li>Obsolescence of CTI data (reactivation of a known C&amp;C)</li>



<li>Limitations related to alert thresholds for specific events (at what point, in terms of packets, ports, or targeted IPs, is a scan considered abnormal?)</li>



<li>Presence of unnecessary and/or vulnerable open services</li>



<li>Failure to detect data leakage by a Data Leak Detection service</li>
</ul>



<p><strong>Regarding response:</strong></p>



<ul class="wp-block-list">
<li>Application errors in severity qualification event processes</li>



<li>Delays in exporting or retrieving logs required for an investigation</li>



<li>Limitations on access provided to analysts for their investigations</li>



<li>Coordination of alert sharing between internal teams and the MSSP (Managed Security Service Provider)</li>



<li>Coordination between security teams and IT teams to neutralize or contain the threat (network isolation of the source, disconnecting a malicious device, etc.)</li>
</ul>



<h2 class="wp-block-heading">BAS throws a wrench into the Red Team&#8217;s work</h2>



<p>One of the benefits of Breach and Attack Simulation solutions is the training of defense teams (Blue Team). The more they face increasingly complex simulations, the more detection mechanisms will be optimized, the more effective the defenders&#8217; processes and reflexes will become, and the faster and more relevant their investigations will be.</p>



<p>In summary, BAS will not replace Red Teams but will drive them to be better.</p>



<h2 class="wp-block-heading">BAS = Panoramic Photo and Red Team = Photo with 24x Zoom</h2>



<p>A well-executed Red Team is an undetected Red Team. And this result is what is reported: &#8220;if a highly skilled, well-organized attacker takes their time to target you, they will eventually succeed.&#8221;</p>



<p>This is a strong message, but it is becoming less audible to CEOs and auditors. Repeated for years, this message is well understood and absorbed. The proof: cybersecurity budgets increase every year, and technological components continue to stack up.</p>



<p>The question now being asked is about the real and overall effectiveness of these measures and investments. Since the Red Team focuses on a specific and well-defined path, it cannot provide this comprehensive picture. BAS and its more &#8220;massive&#8221; approach offer a response to this new question.</p>



<h2 class="wp-block-heading">To measure, you need a precise rule</h2>



<p>The concepts of measurement and ranking are increasingly prominent in assessing cybersecurity performance within organizations.</p>



<p>To measure the evolution of cybersecurity maturity, you need a baseline reference point that serves as a standard for comparison. In the realm of IT, comparison relies on precise and replicable technical criteria and actions. It&#8217;s crucial to compare apples to apples.</p>



<p>Consider a real-life scenario:</p>



<p>During an attack simulation, the SOC doesn&#8217;t detect the 3 persistence tactics automatically executed by the BAS. Upon analysis, it becomes apparent that the detection scenario is not correctly configured. This can happen, and the MSSP corrects it. A second test a few weeks later, the BAS replays the exact same technical event (flow, source, target, time, sequencing, etc.). This time, the scenario triggers an alert. Bingo! The scenario is then automatically retested periodically. This is done to verify that there is no regression, for continuous monitoring and assurance of ongoing compliance.</p>



<h2 class="wp-block-heading">To conclude</h2>



<p>If there&#8217;s one piece of advice to take away: if you&#8217;re considering mobilizing a Red Team, do it in environments where BAS solutions indicate that you excel.</p>



<p>It is in these specific contexts and environments that the human touch of a Red Team will bring you the most interesting results.</p>



<p>In this regard, BAS and Red Teams are unquestionably complementary and will remain so for a long time.</p>



<p></p>
<p>The post <a href="https://www.erium.fr/en/bas-versus-red-team-how-attack-simulation-alters-the-landscape/">BAS versus Red Team : how attack simulation alters the landscape</a> appeared first on <a href="https://www.erium.fr/en/homepage-v2">Erium</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
