What's Hot

    Former Treasury Secretary Henry Paulson warns U.S. wants an emergency ‘break-the-glass’ plan if Treasury demand collapses | Invesloan.com

    April 16, 2026

    Jane Seymour Says Dating in Her 70s Changed How She Marks Milestones | Invesloan.com

    April 16, 2026

    Trump admin urges Exxon, Chevron, different oil cos to spice up drilling amid Iran conflict | Invesloan.com

    April 16, 2026
    Facebook Twitter Instagram
    Finance Pro
    Facebook Twitter Instagram
    invesloan.cominvesloan.com
    Subscribe for Alerts
    • Home
    • News
    • Politics
    • Money
    • Personal Finance
    • Business
    • Economy
    • Investing
    • Markets
      • Stocks
      • Futures & Commodities
      • Crypto
      • Forex
    • Technology
    invesloan.cominvesloan.com
    Home » AI Is Exposing a Security Gap Companies Aren’t Staffed for: Researcher | Invesloan.com
    Money

    AI Is Exposing a Security Gap Companies Aren’t Staffed for: Researcher | Invesloan.com

    December 21, 2025Updated:December 21, 2025
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Companies may have cybersecurity teams in place, but many still aren’t prepared for how AI systems actually fail, says an AI security researcher.

    Sander Schulhoff, who wrote one of the earliest prompt engineering guides and focuses on AI system vulnerabilities, said on an episode of “Lenny’s Podcast” published Sunday that many organizations lack the talent needed to understand and fix AI security risks.

    Traditional cybersecurity teams are trained to patch bugs and address known vulnerabilities, but AI doesn’t behave that way.

    “You can patch a bug, but you can’t patch a brain,” Schulhoff said, describing what he sees as a mismatch between how security teams think and how large language models fail.

    “There’s this disconnect about how AI works compared to classical cybersecurity,” he added.

    That gap shows up in real-world deployments. Cybersecurity professionals may review an AI system for technical flaws without asking: “What if someone tricks the AI into doing something it shouldn’t?” said Schulhoff, who runs a prompt engineering platform and an AI red-teaming hackathon.

    Unlike traditional software, AI systems can be manipulated through language and indirect instructions, he added.

    Schulhoff said people with experience in both AI security and cybersecurity would know what to do if an AI model is tricked into generating malicious code. For example, they would run the code in a container and ensure the AI’s output doesn’t affect the rest of the system.

    The intersection of AI security and traditional cybersecurity is where “the security jobs of the future are,” he added.

    The rise of AI security startups

    Schulhoff also said that many AI security startups are pitching guardrails that don’t offer real protection. Because AI systems can be manipulated in countless ways, claims that these tools can “catch everything” are misleading.

    “That’s a complete lie,” he said, adding that there would be a market correction in which “the revenue just completely dries up for these guardrails and automated red-teaming companies.”

    AI security startups have been riding the wave of investor interest. Big Tech and venture capital firms have poured money into the space as companies rush to secure AI systems.

    In March, Google bought cybersecurity startup Wiz for $32 billion, a deal aimed at strengthening its cloud security business.

    Google CEO Sundar Pichai said AI was introducing “new risks” at a time when multi-cloud and hybrid setups are becoming more common.

    “Against this backdrop, organizations are looking for cybersecurity solutions that improve cloud security and span multiple clouds,” he added.

    Business Insider reported last year that growing security concerns around AI models have helped fuel a wave of startups pitching tools to monitor, test, and secure AI systems.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Keep Reading

    Jane Seymour Says Dating in Her 70s Changed How She Marks Milestones | Invesloan.com

    Emma Grede Was Criticized for Being a ‘3-Hour Mom.’ 4 Moms Reacted. | Invesloan.com

    Netflix Cofounder Reed Hastings Is Leaving the Company | Invesloan.com

    Mamdani Releases 2025 Tax Returns, Discloses $1,643 From Rap Royalties | Invesloan.com

    See Spirit Airlines’ History From Trucking Company to Low-Cost Giant | Invesloan.com

    Claude Will Require Identity Verification for ‘a Few Use Cases’ | Invesloan.com

    Solo Cruise Surprises on Royal Caribbean’s Wonder of the Seas | Invesloan.com

    Iran Digging Out Remaining Missiles, Launchers: Pentagon | Invesloan.com

    How NYC’s Tax on Multi-Million Dollar Vacation Homes Could Work | Invesloan.com

    LATEST NEWS

    Former Treasury Secretary Henry Paulson warns U.S. wants an emergency ‘break-the-glass’ plan if Treasury demand collapses | Invesloan.com

    April 16, 2026

    Jane Seymour Says Dating in Her 70s Changed How She Marks Milestones | Invesloan.com

    April 16, 2026

    Trump admin urges Exxon, Chevron, different oil cos to spice up drilling amid Iran conflict | Invesloan.com

    April 16, 2026

    Trump administration expands visa restrictions in Western Hemisphere | Invesloan.com

    April 16, 2026
    POPULAR

    China’s first passenger jet completes maiden commercial flight

    May 28, 2023

    Numbers taking US accountancy exams drop to lowest level in 17 years

    May 29, 2023

    Toyota chair faces removal vote over governance issues

    May 29, 2023
    Advertisement
    Load WordPress Sites in as fast as 37ms!
    Facebook Twitter Pinterest WhatsApp Instagram
    © 2007-2023 Invesloan.com All Rights Reserved.
    • Privacy
    • Terms
    • Press Release
    • Advertise
    • Contact

    Type above and press Enter to search. Press Esc to cancel.

    invesloan.com
    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}