5 AI Priorities to Stay Competitive

COMMENTARY. Artificial intelligence: Since the invention of the operating system, we haven't seen a technology poised to have such far-reaching impact on the way we work and live.
According to a recent study by Avanade, in which we surveyed more than 3,000 business and IT executives globally, 92% of respondents agree that their organization needs to shift to an AI-first operating model this year to stay competitive.
Many organizations are reacting to the hype, rushing to satisfy board curiosity and deploying AI somewhere to check a box.
They're often jumping ahead of the important and tough work of finding the right problem for the technology, understanding their AI readiness, and designing a road map that matches it.
The technology industry at large has some important but tough work ahead, too, ensuring that we're leading by example and designing and applying AI responsibly.
Just because we can use AI for everything doesn't mean that we should.
As we all absorb the mania we were exposed to in 2023, I recommend that individuals, organizations, and the overall technology industry focus on these five priorities in 2024.
Closing the gap between AI advancements and government regulations.
Although the United States government and the European Union announced policies around the use of AI, we're still living with a Wild West-type framework.
Advancements in the application of AI will require access to tons of data, and this will clash with privacy concerns.
I believe there's a huge opportunity for technology firms to do what matters and come forward to invest in privacy-preserving technologies.
Mitigating bias in AI is essential for fairness and equality, as biased systems can perpetuate social inequalities.
Public trust in AI technology hinges on its perceived fairness and lack of bias.
Legal and regulatory compliance as AI governance evolves mandates vigilance against bias.
Technology professionals must be able to tell the story of how the data is calculated, linked, and transformed to those who are asked to sign off on projects and budgets.
Stakeholders will be wary of what they don't understand and what doesn't seem transparent, especially around fairness and bias.
An AI specialist needs to possess soft skills and collaborative capabilities.
They'll be working with legal, finance, marketing, and human resources, and they must communicate in an effective and straightforward way.
AI is a strategic business capability that can and should impact all parts of an organization, and it's going to foster collaboration like you've never seen.
This is a critical component of understanding and managing risk tolerance, being compliant, and most importantly, building confidence and trust in AI technologies.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 08 Feb 2024 18:00:05 +0000


Cyber News related to 5 AI Priorities to Stay Competitive

5 AI Priorities to Stay Competitive - COMMENTARY. Artificial intelligence: Since the invention of the operating system, we haven't seen a technology poised to have such far-reaching impact on the way we work and live. According to a recent study by Avanade, in which we surveyed more than ...
10 months ago Darkreading.com
The Future of Business Communications: Trends Shaping the Industry - Keeping up with technology trends, especially focusing on effective business communication with your customers across all platforms, is crucial for your company's success. Trends in 2024 include integrating omnichannel campaign management solutions ...
8 months ago Hackread.com
Navigating Security Research: A Comprehensive Guide - As technology and digital data become more prominent in our lives, securing the means and methods of managing our data is paramount. With cyber-attacks becoming increasingly sophisticated, it is important for those responsible for data protection to ...
1 year ago Thehackernews.com
API Analytics - Managing APIs effectively is no longer just about designing and deploying them-it's also about harnessing the power of data-driven insights through API analytics. In this article, we'll explore the transformative role of API analytics in enhancing ...
1 year ago Feeds.dzone.com
Legal and Compliance Considerations in Cloud Computing - This paradigm change has faced challenges, primarily legal and compliance issues. This can present severe legal issues, particularly regarding data ownership. According to S. Krishnan, the transforming nature of computing has created legal ...
10 months ago Feeds.dzone.com
Top 3 Priorities for CISOs in 2024 - As the new year begins, CISOs gather with their security teams and corporate management to scope out top priorities for 2024 and how to address these issues. This year - with a multitude of new privacy laws, Securities and Exchange Commission ...
11 months ago Darkreading.com
Saudi Arabia's National Cybersecurity Authority Announces the GCF Annual Meeting 2024 - Under the theme 'Advancing Collective Action in Cyberspace,' the event will unite thought leaders, decision makers and experts across the global Cyberspace community to bolster international cooperation, address shared challenges, enhance ...
9 months ago Darkreading.com
Industry regulations and standards are driving OT security priorities - When it comes to ransomware attacks, the impact on OT environments is catching up to the impact on IT environments, according to Claroty. In Claroty's previous survey conducted in 2021, 32% of ransomware attacks impacted IT only, while 27% impacted ...
1 year ago Helpnetsecurity.com
What Should We Expect for State and Local Government IT Priorities in 2024? - As we wrap up 2023, it is a great time to reflect on the current state of technology in state and local governments and look ahead to the priorities for the coming year. Maintaining the security of networks and the data they carry continues to be the ...
1 year ago Feedpress.me
Navigating the Cybersecurity Landscape - Cyber threats are diverse and continually evolving, ranging from commonplace scams to highly sophisticated attacks. Let's delve deeper into the nature of prevalent threats, gaining a nuanced understanding that will serve as the foundation for robust ...
1 year ago Feeds.dzone.com
Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media - In the age of digital inter-connectedness, social media has become an integral part of our daily lives, enabling us to connect, share, and communicate globally. As cyber threats continue to evolve, it's crucial to adopt proactive measures to ensure ...
11 months ago Cybersecurity-insiders.com
Cybercrime Groups Offer Up to $20K/Month Jobs on the Dark Web - Cybercrime groups are increasingly running their operations as a business, promoting jobs on the dark web that offer developers and hackers competitive monthly salaries, paid time off, and paid sick leaves. In a new report by Kaspersky, which ...
1 year ago Bleepingcomputer.com
CIOs shape long-term success with GenAI expertise - Today's CIOs have evolved from managing IT infrastructure and ensuring systems' efficiency to becoming key business strategists, according to IDC. They stand at the intersection of technology and business, leveraging innovations to shape ...
1 year ago Helpnetsecurity.com
Encouraging Ethical Hacking Skills in Students - This article delves into the significance of encouraging ethical hacking skills in students and the numerous benefits it offers to individuals and society as a whole. Possessing ethical hacking skills can provide students with a competitive advantage ...
1 year ago Securityzap.com
Balancing AI's promise with privacy and intellectual property concerns - Organizations increasingly integrate AI technologies into their cybersecurity architectures to enhance detection, response, and mitigation capabilities. Powered by AI, predictive analytics enables security systems to forecast potential ...
1 year ago Helpnetsecurity.com
Cybersecurity Competitions for Students - Cybersecurity competitions offer students a unique opportunity to develop and showcase their skills in a competitive environment. Participating in cybersecurity competitions offers students invaluable opportunities for professional growth and skill ...
1 year ago Securityzap.com
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
1 year ago Bleepingcomputer.com
Microsoft's January 2024 Patch Tuesday Addresses 49 Vulnerabilities, Including Two Critical Vulnerabilities - Microsoft's first Patch Tuesday of 2024 has arrived, and it's a significant one. The tech giant has released fixes for a total of 49 vulnerabilities, including 12 remote code execution vulnerabilities and two critical vulnerabilities. These ...
11 months ago Securityboulevard.com
The Rise in Attacks Requires Specialized Expertise - Organizations today are increasingly reliant on the convenience, scalability and cost-effectiveness of migrating data and operations to the cloud. While cloud migration offers organizations significant benefits, it has also opened them up to a myriad ...
1 year ago Paloaltonetworks.com
CVE-2024-46837 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
2 months ago Cyberdefensemagazine.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
1 year ago Cybersecurity-insiders.com
CISO Corner: Deep Dive Into SecOps, Insurance, & CISOs' Evolving Role - Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. We're committed to bringing you a diverse set of perspectives to support the job of operationalizing ...
11 months ago Darkreading.com
South Korea makes crypto crackdown a national priority The Register - South Korea's Ministry of Justice will create a "Virtual Currency Tracking System" to crack down on money laundering facilitated by cryptocurrencies, and rated the establishment of the facility among its priorities for the year. The Ministry last ...
1 year ago Packetstormsecurity.com
Fighting Ursa Aka APT28: Illuminating a Covert Campaign - Early this year, Ukrainian cybersecurity researchers found Fighting Ursa leveraging a zero-day exploit in Microsoft Outlook. During this time, Fighting Ursa conducted at least two campaigns with this vulnerability that have been made public. Unit 42 ...
1 year ago Unit42.paloaltonetworks.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)