Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Priority’s Current Plus Ebike Powers You Up the Meanest Hills

    June 1, 2025

    Get 20% Off with a Brooks Promo Code for June 2025

    June 1, 2025

    Trump pulls Musk ally’s NASA Administrator nomination

    May 31, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » WIRED Exclusive | The Top US Cybersecurity Agency Has a New Plan for Weaponized AI
    Security

    WIRED Exclusive | The Top US Cybersecurity Agency Has a New Plan for Weaponized AI

    News RoomBy News RoomNovember 30, 20233 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Last month, a 120-page United States executive order laid out the Biden administration’s plans to oversee companies that develop artificial intelligence technologies and directives for how the federal government should expand its adoption of AI. At its core, though, the document focused heavily on AI-related security issues—both finding and fixing vulnerabilities in AI products and developing defenses against potential cybersecurity attacks fueled by AI. As with any executive order, the rub is in how a sprawling and abstract document will be turned into concrete action. Today, the US Cybersecurity and Infrastructure Security Agency (CISA) will announce a “Roadmap for Artificial Intelligence” that lays out its plan for implementing the order.

    CISA divides its plans to tackle AI cybersecurity and critical infrastructure-related topics into five buckets. Two involve promoting communication, collaboration, and workforce expertise across public and private partnerships, and three are more concretely related to implementing specific components of the EO. CISA is housed within the US Department of Homeland Security (DHS).

    “It’s important to be able to put this out and to hold ourselves, frankly, accountable both for the broad things that we need to do for our mission, but also what was in the executive order,” CISA director Jen Easterly told WIRED ahead of the road map’s release. “AI as software is clearly going to have phenomenal impacts on society, but just as it will make our lives better and easier, it could very well do the same for our adversaries large and small. So our focus is on how we can ensure the safe and secure development and implementation of these systems.”

    CISA’s plan focuses on using AI responsibly—but also aggressively in US digital defense. Easterly emphasizes that, while the agency is “focused on security over speed” in terms of the development of AI-powered defense capabilities, the fact is that attackers will be harnessing these tools—and in some cases already are—so it is necessary and urgent for the US government to utilize them as well.

    With this in mind, CISA’s approach to promoting the use of AI in digital defense will center around established ideas that both the public and private sectors can take from traditional cybersecurity. As Easterly puts it, “AI is a form of software, and we can’t treat it as some sort of exotic thing that new rules need to apply to.” AI systems should be “secure by design,” meaning that they’ve been developed with constraints and security in mind rather than attempting to retroactively add protections to a completed platform as an afterthought. CISA also intends to promote the use of “software bills of materials” and other measures to keep AI systems open to scrutiny and supply chain audits.

    “AI manufacturers [need] to take accountability for the security outcomes—that is the whole idea of shifting the burden onto those companies that can most bear it,” Easterly says. “Those are the ones that are building and designing these technologies, and it’s about the importance of embracing radical transparency. Ensuring we know what is in this software so we can ensure it is protected.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleElon Musk’s Media Matters Lawsuit Will Have a ‘Chilling Effect’
    Next Article Tesla Cybertruck will usher in a new “Powershare” vehicle-to-load charging feature

    Related Posts

    The Privacy-Friendly Tech to Replace Your US-Based Email, Browser, and Search

    May 30, 2025

    How to Win Followers and Scamfluence People

    May 30, 2025

    The US Is Building a One-Stop Shop for Buying Your Data

    May 29, 2025

    Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

    May 27, 2025

    Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials

    May 24, 2025

    3 Teens Almost Got Away With Murder. Then Police Found Their Google Searches

    May 22, 2025
    Our Picks

    Get 20% Off with a Brooks Promo Code for June 2025

    June 1, 2025

    Trump pulls Musk ally’s NASA Administrator nomination

    May 31, 2025

    This Staples Standing Desk Isn’t Flashy but It’s Reliable for the Money

    May 31, 2025

    The Nike x Hyperice Hyperboots Will Give You a Heated Foot Massage While You Walk

    May 31, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    Apple’s Big OS Rebrand, OnePlus Embraces AI, and Samsung’s Next Folds—Your Gear News of the Week

    By News RoomMay 31, 2025

    Confused by Apple’s naming conventions? You’re not the only one. Bloomberg reports that this year…

    Sony’s DualSense Edge controller is receiving a rare $30 discount

    May 31, 2025

    Slate Auto FAQ: your questions answered

    May 31, 2025

    A New Study Reveals the Makeup of Uranus’ Atmosphere

    May 31, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.