* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [AI and Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/) * Baby Tigers Bite --- The Hi... # Baby Tigers Bite --- The Hidden Risks of Scaling AI Too Fast [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2025%2F06%2Fhidden-risks-scaling-ai-too-fast%2F) [](https://twitter.com/share?text=Baby+Tigers+Bite+%E2%80%94+The+Hidden+Risks+of+Scaling+AI+Too+Fast&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2025%2F06%2Fhidden-risks-scaling-ai-too-fast%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2025%2F06%2Fhidden-risks-scaling-ai-too-fast%2F&title=Baby+Tigers+Bite+%E2%80%94+The+Hidden+Risks+of+Scaling+AI+Too+Fast&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2025/06/hidden-risks-scaling-ai-too-fast/&ts=markdown) \[\](mailto:?subject=Baby Tigers Bite — The Hidden Risks of Scaling AI Too Fast) Link copied By [Dena De Angelo](https://www.paloaltonetworks.com/blog/author/ddeangelo/?ts=markdown "Posts by Dena De Angelo") Jun 17, 2025 6 minutes [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown) [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown) [Interview](https://www.paloaltonetworks.com/blog/category/interview/?ts=markdown) [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [AI](https://www.paloaltonetworks.com/blog/tag/ai/?ts=markdown) [Beyond the Code](https://www.paloaltonetworks.com/blog/tag/beyond-the-code/?ts=markdown) [series](https://www.paloaltonetworks.com/blog/tag/series/?ts=markdown) In a recent episode of the [Threat Vector podcast](https://thecyberwire.com/podcasts/threat-vector/66/notes), host David Moulton chatted with [Noelle Russell](https://www.linkedin.com/in/noelleai/), founder and chief AI officer at the [AI Leadership Institute](https://aileadershipinstitute.com/). She shared a powerful metaphor for artificial intelligence implementation that every security professional should heed: the "baby tiger." As Russell explains, organizations often begin their AI journeys with an adorable, novel model that excites everyone. Teams gather around this cute innovation, marveling at its capabilities without asking the critical questions: How large will it grow? What will it eat? Where will it live? What happens when you don't want it anymore? The reality is stark -- baby tigers become adult tigers, and adult tigers can be dangerous. As AI systems scale from prototypes to production environments, the risks scale with them. Without proper guardrails, governance and security measures, what begins as an exciting innovation can quickly become an organizational liability. When your organization adopts AI, are you planning for the cute baby tiger or preparing for the full-grown predator it will inevitably become? ## **The Three-Headed Risk Monster: Accuracy, Fairness and Security** According to Russell, AI risks typically fall into three distinct buckets that security leaders must address. * **Accuracy:** Too often, organizations accept "pretty good" answers from AI systems rather than demanding precision. As these models scale and their ground truth begins to shift through machine learning, monitoring for model drift becomes essential, yet many companies fail to implement proper accuracy checks outside of research environments. * **Fairness:** Your AI system might not only provide inaccurate information but could inadvertently harm the people it's meant to help. For instance, financial services that AI trained on biased data could disenfranchise certain demographic groups or zip codes, perpetuating existing inequalities. * **Defense and Security:** Every AI implementation increases your attack surface. Without proper security controls, this expansion can exponentially increase threat exposure across your organization. What makes addressing these risks particularly challenging is that they often require different levels and domain expertise. As Russell notes, "The people that care about accuracy... they're the guys that plan their vacations on an Excel spreadsheet." Meanwhile, inclusion specialists typically concern themselves with fairness, while security remains the domain of cybersecurity professionals. The crucial task is bringing these diverse perspectives together from the outset of any AI initiative. ## **Building AI Security Into Your DNA, Not Bolting It On** When asked about the biggest blind spots in AI deployments, Russell highlighted a familiar struggle for security professionals: alignment and inclusion. Too often, AI initiatives are driven either by technologists solving interesting problems or by business leaders seeking productivity and profit -- neither of whom naturally invite security or legal teams to the conversation early enough. > I do a lot of executive education where I just tell the executives it starts with legal, security, DevSecOps. Those people need to be their first number one. The critical insight here mirrors a longstanding security maxim -- security must be part of the DNA of any AI system, not something bolted on at the end. Russell uses vivid imagery to reinforce this point: "It has to be more like water in a wave" rather than "a raisin in a bun or a chocolate chip in a muffin." Security considerations must permeate every aspect of AI development and deployment. ## **The Case for AI Governance Integrated with Cybersecurity** For organizations looking to scale AI responsibly, integrating AI governance with existing cybersecurity programs isn't just advisable, it's essential. Russell advocates a practical approach -- leverage what's already working in your organization. > Data governance is ultimately AI governance. They are the same thing. It is an evolution of the same process. Organizations should expand the scope of existing data governance teams to include AI systems. This integration requires resources, which Russell creatively secures by preallocating benefits from AI projects: "For every net new dollar -- 25% -- I've been able to sell that to executives to preallocate" toward cybersecurity. By framing this as investing future profits rather than current budget, she's found executives more receptive. ## **Cultivating Curiosity, the Missing Ingredient in AI Security Culture** Beyond technical controls and governance frameworks, Russell identifies a crucial cultural element for AI security -- *curiosity*. Security professionals must foster an environment where people continually question AI systems with the right skepticism: * Where is this data coming from? * How is it governed? * How did the system reach this conclusion? * Is this information trustworthy? * Who else should be involved in reviewing this? This culture of curiosity extends to red teaming practices, which take on new dimensions in the AI context. Russell describes running "break your bot challenges" where employees across the organization, "from the boardroom to the whiteboard to the keyboard," build and then attempt to break AI systems. What makes AI red teaming unique is that it's not just about adversarial attacks, but also benign interactions that could accidentally produce harmful outcomes. The solution is what Russell calls a "symphony of talent" -- diverse perspectives testing the system from different angles. This approach helps patch not just against security vulnerabilities but also against the biases and blindness that developers inherently bring to their work. ## **Preparing for the Regulatory Wave Without Reinventing the Wheel** With the EU AI Act and US executive orders creating a rapidly evolving regulatory landscape, security leaders must prepare their organizations for compliance. Russell offers pragmatic advice: "Don't start from scratch." She points to several valuable resources: * [U.S. State Department Enterprise AI Strategy FY2024-FY2025: *Empowering Diplomacy through Responsible AI*](https://www.state.gov/wp-content/uploads/2023/11/Department-of-State-Enterprise-Artificial-Intelligence-Strategy.pdf) * State and local government AI guidance principles (like those from [Maricopa County, Arizona](https://aset.az.gov/sites/default/files/2024-03/P2000%20-%20Generative%20AI%20Policy.pdf)) * [OpenAI's preparedness framework](https://openai.com/index/updating-our-preparedness-framework/) and [Anthropic's Responsible Scaling Policy](https://www-cdn.anthropic.com/872c653b2d0501d6ab44cf87f43e1dc4853e4d37.pdf) These resources represent significant investments in AI governance -- "$40 million was invested to create these documents for the federal government" -- that organizations can leverage as starting points for their own compliance efforts. At minimum, they establish a floor that no organization should fall below. ## **AI Auditing AI** As AI becomes increasingly central to business operations, Russell sees AI audits becoming as standardized as financial audits, particularly in regulated industries, like finance and healthcare. Interestingly, she envisions AI systems themselves playing a role in these audits. "When you build a model, it's completely different," she explains, dispelling concerns about AI auditing itself. "It's not the student grading their own homework," but more like having "another faculty member, Nobel Prize winner actually grading a student." ## **From Baby Tigers to Secure, Mature Systems** The journey from AI enthusiasm to responsible execution requires security professionals to play a central role from day one. By addressing the triple threat of accuracy, fairness and security concerns, embedding security into the DNA of AI systems, and fostering a culture of curiosity and diverse perspectives, organizations can successfully scale AI while managing risks. As Russell succinctly puts it, become "a doer, not a talker." Start building models, not just using them to understand the security implications. The key is bringing security expertise to the AI development table early and ensuring these powerful tools serve your organization's goals without becoming the tiger that bites back. ### **Want to learn more about GenAI and recognize the risks? Download our research report "** [**The State of Generative AI**](https://www.paloaltonetworks.com/resources/research/state-of-genai-2025).**"** *** ** * ** *** ## Related Blogs ### [AI and Cybersecurity](https://www.paloaltonetworks.com/blog/security-operations/category/ai-and-cybersecurity/?ts=markdown), [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Interview](https://www.paloaltonetworks.com/blog/category/interview/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [People of Palo Alto Networks](https://www.paloaltonetworks.com/blog/category/people-of-palo-alto-networks/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### When Security Becomes an Afterthought](https://origin-researchcenter.paloaltonetworks.com/blog/2026/02/when-security-becomes-an-afterthought/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Partnering with Precision in 2026](https://origin-researchcenter.paloaltonetworks.com/blog/2025/12/partnering-with-precision-in-2026/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [CSO Perspective](https://www.paloaltonetworks.com/blog/category/cso-perspective/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Predictions](https://www.paloaltonetworks.com/blog/category/predictions/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) [#### Securing the AI Before Times](https://origin-researchcenter.paloaltonetworks.com/blog/2025/08/securing-ai-before-times/) ### [AI Governance](https://www.paloaltonetworks.com/blog/category/ai-governance/?ts=markdown), [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [Government](https://www.paloaltonetworks.com/blog/category/government/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) [#### A Secure Vision for Our AI-Driven Future](https://origin-researchcenter.paloaltonetworks.com/blog/2025/07/secure-vision-ai-driven-future/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Interview](https://www.paloaltonetworks.com/blog/category/interview/?ts=markdown) [#### Security by Design --- UX and AI in Modern Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/2025/07/security-by-design-ux-ai-modern-cybersecurity/) ### [AI Security](https://www.paloaltonetworks.com/blog/category/ai-security/?ts=markdown), [Must-Read Articles](https://www.paloaltonetworks.com/blog/security-operations/category/must-read-articles/?ts=markdown), [News and Events](https://www.paloaltonetworks.com/blog/security-operations/category/news-and-events/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Global Reach --- The New Scale of Chinese Cyberthreats](https://origin-researchcenter.paloaltonetworks.com/blog/2025/06/new-scale-chinese-cyberthreats/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language