In the rapidly evolving world of cloud computing and generative artificial intelligence (AI), data security has become a top concern for organizations around the world. infrastructure security, newly launched platformaims to tackle these challenges head-on.
Bedrock Security has secured $10 million in seed funding from leading cybersecurity investor Greylock, highlighting the importance of data in driving growth for organizations. The company's founders are acutely aware of the need to protect this data from the risks posed by emerging technologies.
Pranava Adduri, CEO and co-founder of Bedrock Security, said in a news release on Tuesday (March 26): Bedrock announced the debut of its Data His Security platform.
AI data challenges
Bedrock provides protection for sensitive data in industries such as banking, insurance, healthcare, retail, and financial services where keeping regulated data safe is critical. In addition, Bedrock's ability to handle unique and proprietary forms of intellectual property supports specialized areas such as genomics, electronic design automation (EDA), and computer-aided design (CAD).
The company's solution is centered around its AI Reasoning (AIR) engine. AIR continually learns and adapts to go beyond the limitations of traditional rules-based systems and understand the true context and sensitivity of enterprise data.
In an interview with PYMNTS, Aduri said this approach is essential for industries that operate under highly regulated conditions or deal with valuable intellectual property (IP).
“Traditional approaches to data security rely on rules to identify regulated data and intellectual property,” he said. “But when the data changes or new data types are introduced, especially with today's cloud and GenAI data explosion, the rules don't work. AI Reasoning (AIR) uses modern AI Bedrock can keep up with new data as it is created, inferring which data is most important and critical to the business.
AI is revolutionizing How security teams combat cyber threats and improve speed and efficiency. Scrutinize large data sets to identify complex patterns and automate preliminary steps in incident analysis. This advancement provides security professionals with a comprehensive view and significantly reduces response time.
Timothy E. Bates, former CTO of Lenovo, emphasized the role of AI in strengthening defenses.
“Machine learning helps discover anomalous activity, and AI-powered platforms provide detailed threat insights and predictive analysis,” he said.
Bates also pointed to the effectiveness of deep learning in analyzing malware to decipher its structure and, in some cases, perform reverse engineering attacks.
“These AI solutions work behind the scenes and are constantly evolving as new threats emerge, with the aim of not only protecting but neutralizing future dangers,” he added. .
As the global economy becomes more interconnected, cybercrime is on the rise.according to FBI report, In 2022, the United States alone faced losses of over $10.3 billion due to cyberattacks.
Keep your IP safe
To prevent sensitive data and core intellectual property (IP) from being accidentally used in large-scale language models (LLMs), it is important to first understand exactly what this data is and where it is located. said Aduri. That's where his AIR from Bedrock Security comes into play.
Bedrock also uses trust boundary data boundaries that act like safe zones that define where this sensitive information can be used. These trust boundaries help companies monitor sensitive data and IP, ensuring that no one is unintentionally drawn into an LLM training session or into a system that uses large amounts of data to answer questions. I'll make it.
Aduri pointed out that addressing data risk means keeping all the data a company creates up to date, including how it is used and shared. Traditional methods have difficulty keeping up with the vast amount of data we have today.
“Because adaptive sampling enables continuous detection and trust boundaries specify how regulated data and core IP are used and accessed, control violations are detected in near real-time, allowing security teams to , you can quickly work on containment, which could result in a breach becoming a breach or failing a compliance management audit,” he said.