04/04/2025 | News release | Archived content
Check out the security controls that SANS Institute says are essential for protecting your AI systems. Plus, the U.K. NCSC urges organizations to adopt newer API security practices. In addition, CISA and other cyber agencies warn that attackers are using "fast flux" techniques to conceal their actions. And much more!
Dive into five things that are top of mind for the week ending April 4.
How do you protect the growing number of artificial intelligence (AI) systems your organization is gleefully deploying to improve business operations?
That's a critical question cybersecurity teams grapple with every day. In an effort to help bring clarity to this issue, SANS Institute this week published draft guidelines for AI system security.
The "SANS Draft Critical AI Security Guidelines v1.1" document outlines these six key security control categories for mitigating AI systems' cyber risks.
"By prioritizing security and compliance, organizations can ensure their AI-driven innovations remain effective and safe in this complex, ever-evolving landscape," the document reads.
In addition to the six critical security controls, SANS also offers advice for deploying AI models, recommending that organizations do it gradually and incrementally, starting with non-critical systems; that they establish a central AI governance board; and that they draft an AI incident response plan.
For more information about securing AI systems against cyberattacks, check out these Tenable resources:
Organizations must update their methods for securing their application programming interfaces (APIs), including by using stronger authentication.
So said the U.K. National Cyber Security Centre (NCSC) this week in a new guidance document titled "Securing HTTP-based APIs," published in the wake of several high-profile API breaches.
"Strengthening API security should not simply be seen as a protective measure; it can also enable organisations to enhance agility, simplicity and productivity," reads a companion NCSC blog titled "New guidance on securing HTTP-based APIs."
Unfortunately, many organizations rely on outdated API-security practices, including:
NCSC offers detailed recommendations to boost the security of your HTTP-based APIs in areas including:
For example, NCSC recommends adopting strong authentication frameworks like OAuth 2.0 or token-based authentication. It also suggests doing a threat modeling analysis of your API design.
Another recommendation is to develop APIs' applications in a secure development and delivery environment; and to use secure standards, such as JSON for data exchange and TLS cryptography for in-transit data.
For more information about API security:
Cyber attackers are leveraging a technique called "fast flux" to evade detection and conceal their actions, so critical infrastructure organizations, internet service providers and governments must prioritize addressing this critical threat.
The warning comes via a joint cybersecurity advisory issued this week by the governments of Australia, Canada, New Zealand and the U.S.
"Fast flux represents a persistent threat to network security, leveraging rapidly changing infrastructure to obfuscate malicious activity," reads the advisory, titled "Fast Flux: A National Security Threat."
"By implementing robust detection and mitigation strategies, organizations can significantly reduce their risk of compromise by fast flux-enabled threats," the document adds.
A type of dynamic resolution technique, "fast flux" allows cyber criminals, nation-state actors and other cyber attackers to:
Governments, critical infrastructure organizations, ISPs, cybersecurity service providers and protective DNS service providers should take "a multi-layered approach to detection and mitigation to reduce risk of compromise by fast flux-enabled threats," reads an alert from the U.S. Cybersecurity and Infrastructure Security Agency (CISA).
"Fast flux" mitigation recommendations include:
Agencies that co-authored this advisory include CISA, the U.S. Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre, the Canadian Centre for Cyber Security and New Zealand's Nation Cyber Security Centre.
For more information about the "fast flux" technique:
During a recent webinar about our Tenable Web Application Scanning product, we polled attendees about their API security practices, including API discovery and protection. Check out what they said.
(41 webinar attendees polled by Tenable, April 2025)
(38 webinar attendees polled by Tenable, April 2025)
To learn more about API security and about what's new in Tenable Web Application Scanning, watch the webinar on demand.
A U.S. House of Representatives subcommittee held a hearing this week about the ability of U.S. state, local, tribal and territorial (SLTT) governments to address rapidly-changing cyber threats.
Also discussed: The future of the "State and Local Cybersecurity Grant Program" (SLCGP), which was established in 2021 to help boost SLTT governments' cybersecurity preparedness and which is set to expire in September.
"Cybersecurity is a whole-of-society challenge, meaning the Federal government must continue to support and strengthen cybersecurity at the state and local levels to protect our nation's networks and critical infrastructure," said Rep. Andrew Garbarino (R-NY), Chairman of the House Subcommittee on Cybersecurity and Infrastructure Protection.
Tenable Chief Security Officer Robert Huber was one of four experts who testified during the hearing, titled "Cybersecurity is Local, Too: Assessing the State and Local Cybersecurity Grant Program."
Huber, who is also Tenable's Head of Research and President of Tenable Public Sector, emphasized the importance of the SLCGP in strengthening cybersecurity and critical infrastructure, while recommending grant process improvements to increase participation.
Check out a few minutes of Huber's participation in the hearing:
For more information about cybersecurity challenges of state and local governments: