According to Jason Clion, senior director of information security (Ahropic), the company expects virtual artificial ielligence -based employees to be on organizational networks within the next year and we need to prepare them for security.
The statemes of the eropic manager are importa because the manageme of artificial ielligence -based forces inevitably forces companies to review their cyber security strategies, otherwise they may be subject to serious security violations.
In a conversation with Axios, Clion says virtual employees can become one of the hot areas of innovation in artificial ielligence. Unlike curre automated factors that focus on specific tasks, these virtual ideities of independe memory will have specific roles in the organization, accous, and even a dedicated password. Their level of autonomy is far beyond today’s factors.

Clion claims that there are many security challenges in this new world that we have not yet found a good solution. These challenges include how to secure the accous of virtual employees, the proper access to the network, and the determination of their performance manageme.
Clion explained that ahropic has the main responsibility in this direction: the first test of the Claude models to reinforce them against cyber attacks. Second, monitoring safety issues and reducing ways to abuse Claude models by destructive factors.
Ahropic warning about security threats in the world of virtual employees
Currely, network administrators are trying to corol multiple accous and deal with hackers that abuse passwords revealed in the web Dark. In these circumstances, the emergence of virtual employees creates new risks; For example, a virtual employee may penetrate sensitive systems such as testing systems and iegration of the company code, without a specific person’s responsibility.

Clion emphasizes that the security of virtual employees is one of the most importa areas that artificial ielligence companies need to invest. In particular, he insisted on the importance of solutions that are more transpare about the performance of virtual accous and provide a new categorization for these ideities.
Several cyber security companies have already iroduced new products to manage “inhumane ideities”; In February, for example, OKTA launched an iegrated corol platform to protect these ideities and monitor their behavior.



