The Register
Shadow IT has given way to shadow AI. Enter AI-BOMs
ATT&CK techniques detected
T1195.001Compromise Software Dependencies and Development Tools
88%
“important to be able to scan them to make sure that somebody is not manipulating the capabilities, " swanson said. if a skill is supposed to provide a weather forecast, it shouldn ' t also steal credentials or leak secrets, he explained. " understand state changes, constantly sca…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
51%
“any changes. " if you had understanding of state and understanding of state changes, then you would be able to go back to an ai bill of materials and say : ' what system prompt was used within the ingredients to create the ai application? ' and then see it ' s changed from a prio…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
'If you don't have visibility, you can't understand what to protect'
When it comes to securing enterprise supply chains, now heavily infused with AI applications and agents, a software bill of materials (SBOM) no longer provides a complete inventory of all the components in the environment. Enter AI-BOMs.…