Nvidia Application for Container Security Enhances AI Cyber Defense

Nvidia’s NIM Blueprint container for AI-powered cybersecurity offers analysis of common vulnerabilities in just seconds

Heidi Vella, Freelance journalist

October 15, 2024

2 Min Read
Getty Images

Nvidia has released a new application for container security that developers can adapt to meet their requirements for AI-powered cybersecurity. Global consultancy Deloitte has been announced as one of the first users. 

Nvidia NIM Agent Blueprint includes everything an enterprise developer needs to build and deploy customized generative AI applications for rapid vulnerability analysis of software containers, said the company. 

The application is said to accelerate analysis of common vulnerabilities and exposures at enterprise scale from days to just seconds by making use of  Nvidia applications including NIM microservices, Morpheus cybersecurity AI framework, cuVS and RAPIDS accelerated data analytics.

Software containers incorporate large numbers of packages and releases, some of which may be subject to security vulnerabilities. Traditionally, security analysts would need to review each of these packages to understand potential security exploits across any software deployment.

These manual processes are tedious, time-consuming and error-prone and difficult to automate effectively because of the complexity of aligning software packages, dependencies, configurations and the operating environment, according to Nvidia.

NIM Agent Blueprint’s GPU-accelerated, end-to-end AI framework lets developers create optimized applications for filtering, processing and classifying large volumes of streaming cybersecurity data,  Nvidia said.

Related:Cybercriminals Tap Generative AI to Write Malware Code: Study

The application also automates real-time analysis and responses, producing synthetic data to train AI models that can identify risks accurately and run what-if scenarios.

Therefore, NIM Agent Blueprint can help enterprises enhance and simplify cybersecurity by improving efficiency and reducing the time needed to identify threats and potential adversarial activity, the company said. 

Vulnerability detection and resolution is a top use case for generative AI in software delivery, according to IDC.

This is because AI-enhanced cybersecurity can detect and respond to potential threats in real time — often before human analysts even become aware of them according to  Nvidia. 

With generative AI cybersecurity applications can rapidly digest and decipher information across a wide range of data sources, including natural language, to better understand the context in which potential vulnerabilities could be exploited.

For example,  Nvidia said it can analyze vast amounts of data to identify patterns and anomalies that might indicate a breach, as well as automate routine security tasks, freeing up human experts to focus on more complex challenges.

Related:Data Centers Getting Secure Connections via Quantum

Deloitte is one of the first customers to use the new application for container security in its cybersecurity solutions to support agentic analysis of open-source software to help enterprises build secure AI. 

“Cybersecurity has emerged as a critical pillar in protecting digital infrastructure in the U.S. and around the world,” said Mike Morris, managing director, Deloitte & Touche LLP. 

“By incorporating  Nvidia’s NIM Agent Blueprint into our cybersecurity solutions, we’re able to offer our clients improved speed and accuracy in identifying and mitigating potential security threats.”

NIM Agent Blueprint is included in Nvidia's AI Enterprise’s cloud-native software platform for developing and deploying AI applications.

About the Author

Heidi Vella

Freelance journalist, Freelance

Heidi is an experienced freelance journalist and copywriter with over 12 years of experience covering industry, technology and everything in between.

Her specialisms are climate change, decarbonisation and energy transition and she also regularly covers everything from AI and antibiotic resistance to digital transformation. 

Keep up with the ever-evolving AI landscape
Unlock exclusive AI content by subscribing to our newsletter!!

You May Also Like