Responsibly Implementing AI, the Unstoppable Force

The Good News About AI People are using generative AI to see information in a more conversational way.
Generative AI tools can listen and respond to voice input, a popular alternative to typing text into a search engine.
In some forward-thinking organizations, it's even being applied to automate and innovate everyday tasks, like internal help desks.
It's important to remember that many of the most important and exciting use cases are not actually coming from generative AI. Advanced AI/ML models are helping solve some of the biggest problems facing humanity - things like developing new drugs and vaccines.
Enabling customers in the healthcare, medical, and life sciences fields to securely implement AI means helping them solve those big problems.
We have nearly 100 data scientists working on AI/ML algorithms every day, and we have released more than 50 models in support of stopping threats and preventing exfiltration of sensitive data from insiders or attackers who have infected insiders.
Security problems that were intractable are now solvable using AI/ML. For example, attackers have been stealing sensitive data in innovative ways, lifting secrets from virtual whiteboards or concealing data in images by emailing images embedded with sensitive information to evade common security tools.
An attacker could access an exposed repository with credit card images that are hazy or have a glare that traditional security may not recognize, but advanced ML capabilities could help catch.
These kinds of sophisticated attacks, enabled using AI/ML, also cannot be stopped without the use of AI/ML. The Bad News About AI Every technology can be used for good or for bad. Cloud today is both the biggest enabler of productivity and the most frequently employed delivery mechanism for malware.
Hackers are already using generative AI to enhance their attack capabilities - developing phishing emails or writing and automating malware campaigns.
Attackers don't have much to lose nor to worry about how precise or accurate the results are.
If attackers have AI/ML in their arsenal and you don't, good luck.
You need tools, processes, and architectures to protect yourself.
Balancing the good and bad of AI/ML means being able to control what data you're feeding into AI systems and solving the privacy issues to securely enable generative AI. We are at an important crossroads.
While its intention is to give guidance to federal agencies on AI systems testing and usage, the order will have ample applicability to private industry.
As an industry, we must not be afraid to implement AI and must do everything possible to thwart bad actors from applying AI to harm industry or national security.
Some applications will require high precision and accuracy as well as access to sensitive data, but others will not.
Generative AI hallucinations in a medical research context would deter its usage.
Error rates in more benign applications may be OK. Classifying how you're using AI can help you target the low-hanging fruit - the applications that aren't as sensitive to the tools' limitations.
To responsibly achieve any of those aspirational outcomes from generative AI or broader AI/ML models, organizations must first ensure they can protect their people and data from the risks inherent to these powerful tools.


This Cyber News was published on www.darkreading.com. Publication date: Mon, 11 Dec 2023 15:00:06 +0000


Cyber News related to Responsibly Implementing AI, the Unstoppable Force

Zero Trust Security Framework: Implementing Trust in Business - The Zero Trust security framework is an effective approach to enhancing security by challenging traditional notions of trust. Zero Trust Security represents a significant shift in the cybersecurity approach, challenging the conventional concept of ...
1 year ago Securityzap.com
Online Learning Security Best Practices - The rapid increase in remote learning has raised security concerns surrounding online learning platforms. The security of online learning platforms involves implementing robust measures to protect against unauthorized access and data breaches. By ...
1 year ago Securityzap.com
Responsibly Implementing AI, the Unstoppable Force - The Good News About AI People are using generative AI to see information in a more conversational way. Generative AI tools can listen and respond to voice input, a popular alternative to typing text into a search engine. In some forward-thinking ...
1 year ago Darkreading.com
Building a Culture of Digital Responsibility in Schools - In today's technologically-driven world, schools have a critical role in cultivating a culture of digital responsibility among students. Promoting digital responsibility involves educating students about the potential risks and consequences ...
1 year ago Securityzap.com
Biometric Security in Educational Environments - Biometric technology has gained significant attention in recent years as a potential solution to enhance security in educational environments. The adoption of biometric security in educational settings raises important privacy and ethical concerns. ...
1 year ago Securityzap.com
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
1 year ago Securityzap.com
Securing Student Data in Cloud Services - In today's educational landscape, securing student data in cloud services is of utmost importance. One key aspect of securing student data in cloud services is ensuring proper data encryption. This article explores the various challenges and best ...
1 year ago Securityzap.com
Cybersecurity for Homeschooling Parents: A Guide - With the increased reliance on technology and online tools, homeschooling parents must also address the pressing issue of cybersecurity. Whether it's securing tech tools, teaching safe online practices, or accessing valuable resources, this guide ...
1 year ago Securityzap.com
Biometric Authentication in Business: Enhancing Security - With its high level of security, convenience, user-friendliness, and accuracy, biometric authentication is paving the way for the future of secure authentication in the business world. One of the primary advantages of implementing biometric ...
1 year ago Securityzap.com
'Defunct' DOJ ransomware task force raises questions, concerns | TechTarget - "The Office of the Deputy Attorney General (ODAG) memorandum that established the Ransomware Task Force also contained several strategic areas, including directing the Ransomware Task Force to design and implement a strategy to disrupt and dismantle ...
4 months ago Techtarget.com
WordPress Security Research: A Beginner's Series - Over the coming months, this series will be presented through multiple blog posts, each delving into the fundamentals of WordPress's architecture and security mechanisms while featuring real-world examples of vulnerabilities and their exploitation. ...
7 months ago Wordfence.com
From Trend to Mainstay: The Unstoppable Force of Managed Services - There's no denying that IT managed services are being embraced across businesses of all sizes as a path to achieve business goals. As technologies becomes increasingly complex and the lines between siloed architectures become blurred, companies are ...
8 months ago Feedpress.me
The old, not the new: Basic security issues still biggest threat to enterprises - Attacks on critical infrastructure reveal industry faux pas. Ransomware attacks on enterprises saw a nearly 12% drop last year, as larger organizations opt against paying and decrypting, in favor of rebuilding their infrastructure. X-Force analysis ...
1 year ago Helpnetsecurity.com
What Is a Brute Force Attack? - A brute force attack is a type of cyber-attack that criminals use, in order to gain access to a computer system or the private data stored within. This type of attack involves a hacker attempting to guess information, such as passwords or access ...
2 years ago Heimdalsecurity.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
1 year ago Securityzap.com
Protecting Student Privacy Online - In the rapidly evolving world of online education, the protection of student privacy has emerged as a critical concern. This article delves into the privacy risks associated with online education and highlights the significance of complying with ...
1 year ago Securityzap.com
Strategies for Securing Student Data in Cloud Services - This article addresses the strategies that educational organizations can employ to ensure the protection and confidentiality of student data in cloud services. Implementing strong access controls is crucial for ensuring the security of student data ...
1 year ago Securityzap.com
Cybersecurity Challenges in Remote Learning - The increasing prevalence of remote learning in the education sector has brought about new cybersecurity challenges that must be addressed. This article aims to delve into the various cyber threats faced in remote learning and provide practical ...
1 year ago Securityzap.com
Cybersecurity for Art and Design Schools - In the digital age, art and design schools face unique cybersecurity challenges. This article aims to shed light on the importance of cybersecurity in art and design schools and provide insights into safeguarding digital portfolios and ensuring ...
1 year ago Securityzap.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
1 year ago Securityzap.com
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
1 year ago Securityzap.com
IoT Security: Safeguarding Business IoT Devices - The security of IoT devices is of utmost importance as businesses increasingly rely on them to streamline operations and enhance productivity. In this discussion, we will explore the importance of IoT security in safeguarding business IoT devices and ...
1 year ago Securityzap.com
7 Essential Practices for Secure API Development - The necessity for API security cannot be overstated. Authentication and Authorization Authentication and authorization form the cornerstone of secure API interactions. In the world of API security, managing identities accurately ensures that only ...
11 months ago Feeds.dzone.com
Cybersecurity Frameworks: What Do the Experts Have to Say? - Cybersecurity frameworks are blueprints for security programs. Typically developed by governmental organizations, industry groups, or international bodies, they take the guesswork out of developing defense strategies, providing organizations with ...
7 months ago Tripwire.com
CISA Has a New Road Map for Handling Weaponized AI - Last month, a 120-page United States executive order laid out the Biden administration's plans to oversee companies that develop artificial intelligence technologies and directives for how the federal government should expand its adoption of AI. At ...
1 year ago Wired.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)