![The Edge Logo The Edge Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt530eb1f4e672eb44/653a71690e92cc040a3e9d6d/Dark_Reading_Logo_TheEdge_0.png?width=700&auto=webp&quality=80&disable=upscale)
Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
Coalition for Secure AI Promotes Safe, Ethical AI DevelopmentCoalition for Secure AI Promotes Safe, Ethical AI Development
The Coalition for Secure AI (CoSAI) has expanded its roster of members with the addition of threat intelligence management, collaboration, and response orchestration vendor Cyware.
![Human and robotic hands holding up devices Human and robotic hands holding up devices](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltac30e9f5a2ee10c3/669a62460bac56657674ad8f/many-robots-ElenaBS-alamy.jpg?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
The Coalition for Secure AI is a collaborative open source initiative that seeks to aid those looking to create secure-by design artificial intelligence technologies. Its network of stakeholders in business and academia work together to develop holistic approaches and best practices, tools, and methodologies to secure AI development and deployment.
This week, threat intelligence management, collaboration, and response orchestration vendor Cyware became a member of CoSAI. Google is one of the founding members. Other members include OpenAI, Anthropic, Microsoft, IBM, Intel, Nvidia, and PayPal.
The coalition has established three work streams that focus on software supply chain security for AI systems, preparing defenders for a changing cybersecurity landscape, and AI risk governance. It expects to expand into additional areas in the future. Cyware will contribute as an expert in AI-enabled security solutions to help develop industry standards that prioritize safety, ethics, and transparency in AI development, the company said.
CoSAI operates under OASIS Open, an international standards and open source consortium that seeks to help members advance projects in areas including cybersecurity, blockchain, the Internet of Things, emergency management, cloud computing, and legal data exchange.
About the Author
You May Also Like
Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025