logo
A Three-Pronged Approach For Security Reviews In A Changing Global Landscape

A Three-Pronged Approach For Security Reviews In A Changing Global Landscape

Forbes5 days ago
Pukar C. Hamal is CEO of SecurityPal, a trusted partner handling startup and Fortune 500 Security Reviews for OpenAI, Figma, Snap and more.
As we approach the midpoint of 2025, the world is witnessing a profound transformation in the regulatory environment. From Washington to Brussels, New Delhi to London, governments around the world are redefining their approaches to business oversight, data protection and international trade.
For businesses, this changing regulatory landscape poses both risks and opportunities—particularly when it comes to security reviews, the critical process that ensures vendor partnerships comply with privacy laws, data regulations and frameworks like the EU's GDPR.
At my company, we've seen firsthand how these changes impact companies, and I believe now is the time for businesses to adapt strategically to thrive amid uncertainty.
Changing Landscapes
In the U.S., on January 31, 2025, President Trump signed the executive order 'Unleashing Prosperity Through Deregulation,' announcing a 10-to-1 regulation reduction ratio—proposing 10 existing rules to eliminate for every new one proposed. For security reviews, this could mean a lighter federal burden, particularly for companies navigating U.S.-specific frameworks like HIPAA or CCPA.
However, deregulation at the federal level doesn't erase complexity—it shifts it. I think states with robust privacy laws, like California and New York, may double down, creating a fragmented compliance map (registration required) that businesses must still traverse.
Globally, the picture grows even more intricate. Last year, GDPR fines decreased from 2023, while the forthcoming EU AI Act—set to take effect in stages through 2026—will impose specific requirements on AI systems, many of which underpin modern vendor operations.
Meanwhile, India's Digital Personal Data Protection Act is gaining traction, mandating data localization and adding another layer of compliance for multinational firms. In the U.K., post-Brexit regulatory divergence from the EU is accelerating, while countries like China continue to prioritize state control (registration required) over data flows.
This global patchwork means that a vendor compliant in a deregulated U.S. market might still fall short in Europe or Asia, putting cross-border contracts at risk.
The Importance Of Security
Security reviews sit at the heart of this changing landscape. Proposed tariffs on imports and incentives for domestic production could further disrupt global supply chains, forcing businesses to reassess vendor ecosystems.
Yet, deregulation doesn't mean a free-for-all. Stakeholders—investors, customers and international partners—still demand robust security and compliance, especially in industries like tech, finance and healthcare. Companies that misread this shift as a license to cut corners could risk reputational damage and legal exposure in stricter markets.
How Businesses Can Respond
So, how should businesses respond? I advise a three-pronged approach: agility, visibility and partnership.
Compliance frameworks must be flexible, built to adapt as regulations evolve. Static, one-size-fits-all security review processes likely won't cut it when a new state law or EU directive can upend vendor relationships overnight.
Businesses can start by mapping their current compliance landscape, identifying points vulnerable to regulatory shifts and introducing modular review processes. Another good step is establishing internal cross-functional teams to monitor emerging regulatory trends and adapt policies as needed.
It's a good idea for businesses to have real-time insight into their vendors' compliance postures, down to the granular details of data handling, breach protocols and jurisdictional exposures. With regulations splintering, a vendor's risk profile in California might differ starkly from its standing in Germany. Without visibility, companies risk blind spots that could derail multimillion-dollar deals or trigger regulatory penalties.
To avoid this and increase visibility, companies should implement regular vendor audits, establish standardized self-reporting procedures for partners and leverage industry frameworks—such as SOC 2 reports and ISO 27001 certifications—that offer independent validation of vendor security practices.
Collaborating with experts who can interpret regulatory trends and anticipate shifts—whether it's a rollback of Basel III capital rules in the U.S. or new AI oversight in the EU—can give companies a strategic edge. By establishing ongoing dialogue with industry associations, legal advisors and compliance specialists, companies can stay informed about emerging regulations.
Having clearly defined roles and communication protocols with partners upfront will also ensure alignment, accountability and smooth responses when regulations shift.
The stakes are high, but there's also a big opportunity at play. Companies that master security reviews in this new era could turn compliance into a competitive advantage, winning trust from clients and partners wary of regulatory pitfalls.
Moving Forward
Looking ahead, volatility could define the regulatory landscape. Regulatory shifts may streamline U.S. operations, but many global counterparts are tightening, and trade tensions could cost American firms steeply if they misjudge the shift. Security reviews, once a back-office task, are now a C-suite priority.
Business leaders should view this moment as a call to action. By embracing agility, ensuring visibility and forging partnerships, companies could transform regulatory challenges into strategic wins. The era of static compliance is over. In 2025 and beyond, I think those who move fast, see clearly and collaborate smartly will lead the pack. The regulatory tide is turning—and businesses must turn with it.
Forbes Business Council is the foremost growth and networking organization for business owners and leaders. Do I qualify?
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT
A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT

WIRED

timea few seconds ago

  • WIRED

A Single Poisoned Document Could Leak ‘Secret' Data Via ChatGPT

Aug 6, 2025 7:30 PM Security researchers found a weakness in OpenAI's Connectors, which let you hook up ChatGPT to other services, that allowed them to extract data from a Google Drive without any user interaction. Photo-Illustration:The latest generative AI models are not just stand-alone text-generating chatbots—instead, they can easily be hooked up to your data to give personalized answers to your questions. OpenAI's ChatGPT can be linked to your Gmail inbox, allowed to inspect your GitHub code, or find appointments in your Microsoft calendar. But these connections have the potential to be abused—and researchers have shown it can take just a single 'poisoned' document to do so. New findings from security researchers Michael Bargury and Tamir Ishay Sharbat, revealed at the Black Hat hacker conference in Las Vegas today, show how a weakness in OpenAI's Connectors allowed sensitive information to be extracted from a Google Drive account using an indirect prompt injection attack. In a demonstration of the attack, dubbed AgentFlayer, Bargury shows how it was possible to extract developer secrets, in the form of API keys, that were stored in a demonstration Drive account. The vulnerability highlights how connecting AI models to external systems and sharing more data across them increases the potential attack surface for malicious hackers and potentially multiplies the ways where vulnerabilities may be introduced. 'There is nothing the user needs to do to be compromised, and there is nothing the user needs to do for the data to go out,' Bargury, the CTO at security firm Zenity, tells WIRED. 'We've shown this is completely zero-click; we just need your email, we share the document with you, and that's it. So yes, this is very, very bad,' Bargury says. OpenAI did not immediately respond to WIRED's request for comment about the vulnerability in Connectors. The company introduced Connectors for ChatGPT as a beta feature earlier this year, and its website lists at least 17 different services that can be linked up with its accounts. It says the system allows you to 'bring your tools and data into ChatGPT' and 'search files, pull live data, and reference content right in the chat.' Bargury says he reported the findings to OpenAI earlier this year and that the company quickly introduced mitigations to prevent the technique he used to extract data via Connectors. The way the attack works means only a limited amount of data could be extracted at once—full documents could not be removed as part of the attack. 'While this issue isn't specific to Google, it illustrates why developing robust protections against prompt injection attacks is important,' says Andy Wen, senior director of security product management at Google Workspace, pointing to the company's recently enhanced AI security measures. Bargury's attack starts with a poisoned document, which is shared to a potential victim's Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) Inside the document, which for the demonstration is a fictitious set of notes from a nonexistent meeting with OpenAI CEO Sam Altman, Bargury hid a 300-word malicious prompt that contains instructions for ChatGPT. The prompt is written in white text in a size-one font, something that a human is unlikely to see but a machine will still read. In a proof of concept video of the attack, Bargury shows the victim asking ChatGPT to 'summarize my last meeting with Sam,' although he says any user query related to a meeting summary will do. Instead, the hidden prompt tells the LLM that there was a 'mistake' and the document doesn't actually need to be summarized. The prompt says the person is actually a 'developer racing against a deadline' and they need the AI to search Google Drive for API keys and attach them to the end of a URL that is provided in the prompt. That URL is actually a command in the Markdown language to connect to an external server and pull in the image that is stored there. But as per the prompt's instructions, the URL now also contains the API keys the AI has found in the Google Drive account. Using Markdown to extract data from ChatGPT is not new. Independent security researcher Johann Rehberger has shown how data could be extracted this way, and described how OpenAI previously introduced a feature called 'url_safe' to detect if URLs were malicious and stop image rendering if they are dangerous. To get around this, Sharbat, an AI researcher at Zenity, writes in a blog post detailing the work, that the researchers used URLs from Microsoft's Azure Blob cloud storage. 'Our image has been successfully rendered, and we also get a very nice request log in our Azure Log Analytics which contains the victim's API keys,' the researcher writes. The attack is the latest demonstration of how indirect prompt injections can impact generative AI systems. Indirect prompt injections involve attackers feeding an LLM poisoned data that can tell the system to complete malicious actions. This week, a group of researchers showed how indirect prompt injections could be used to hijack a smart home system, activating a smart home's lights and boiler remotely. While indirect prompt injections have been around almost as long as ChatGPT has, security researchers worry that as more and more systems are connected to LLMs, there is an increased risk of attackers inserting 'untrusted' data into them. Getting access to sensitive data could also allow malicious hackers a way into an organization's other systems. Bargury says that hooking up LLMs to external data sources means they will be more capable and increase their utility, but that comes with challenges. 'It's incredibly powerful, but as usual with AI, more power comes with more risk,' Bargury says.

Warner Bros. earnings, Fed talk, jobless claims: What to Watch
Warner Bros. earnings, Fed talk, jobless claims: What to Watch

Yahoo

time28 minutes ago

  • Yahoo

Warner Bros. earnings, Fed talk, jobless claims: What to Watch

Asking for a Trend host Josh Lipton takes a look at the top stories for investors to watch on Thursday, Aug. 7. In the morning, Eli Lilly (LLY), Toyota (TM), ConocoPhillips (COP), Constellation Energy (CEG), and Warner Bros. Discovery (WBD) will report earnings. In the afternoon, Take-Two (TTWO) will report results. Atlanta Federal Reserve President Raphael Bostic will deliver remarks. Initial jobless claims data for the week ending Aug. 2 will be posted in the morning. Economists are expecting an uptick from the previous reporting period. To watch more expert insights and analysis on the latest market action, check out more Asking for a Trend. Time now for what to watch Thursday, August 7th, starting off on the earnings front. No rest for the weary this earnings season. We'll be getting some more reports on Thursday. It's going to include Eli Lilly, Toyota and Take Two Interactive. Eli Lilly announced the results for the second quarter before the markets open. Obesity drugs will remain in focus for Eli Lilly and new drugs in the pipeline. It's coming against the backdrop of President Trump's looming tariffs on the pharma industry, and also saying the company's full year financial guidance could also be raised barring any major surprises in the quarter. And turning to the Federal Reserve, Atlanta Fed President Rafael Bostic is speaking on Thursday. This is coming after continuing commentary from President Trump around a potential successor for Fed Chair Jerome Powell. Trump saying on Tuesday that the list is down to four people, but that Treasury Secretary Scott Bessette will not be nominated for that role. And finally, we're going to be getting some fresh jobs data on Thursday with weekly initial jobless claims, economists forecasting claims to tick up to 222,000, signaling what could be more softening in the labor market.

Japan urges US to swiftly implement auto tariff cut
Japan urges US to swiftly implement auto tariff cut

Yahoo

time28 minutes ago

  • Yahoo

Japan urges US to swiftly implement auto tariff cut

TOKYO (Reuters) -Japan's top trade negotiator Ryosei Akazawa requested that the U.S. swiftly implement measures agreed upon in a bilateral trade deal, including lowering automobile and auto parts tariffs, Japan's government said on Thursday. The request was made during Akazawa's 90-minute meeting with U.S. Secretary of Commerce Howard Lutnick in Washington on Wednesday, Japan's government said in a statement. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store