The dangers of anthropomorphizing AI: An infosec perspective

The generative AI revolution is showing no signs of slowing down.
Chatbots and AI assistants have become an integral part of the business world, whether for training employees, answering customer queries or something else entirely.
At the same time, according to Deloitte's latest State of Generative AI in the Enterprise report, businesses' trust in AI has greatly increased across the board over the last couple of years.
More than 75% of consumers are concerned about misinformation.
The tendency to humanize AI and the degree to which people trust it highlights serious ethical and legal concerns.
Now, we have countless thousands more of these digital assistants, some of which are tailored to specific use cases, such as digital healthcare, customer support or even personal companionship.
Studies show that people overwhelmingly prefer female voices, and that makes us more predisposed to trusting them.
It's not just an ethical problem; it's also a security problem since anything designed to persuade can make us more susceptible to manipulation.
When it becomes almost impossible to tell the difference, we're more likely to trust AI when making sensitive decisions.
We become more vulnerable; more willing to share our personal thoughts and, in the case of business, our trade secrets and intellectual property.
Learn more on AI cybersecurity A magnet for cyber threats.
Generative AI will only become more sophisticated as algorithms are refined and the required computing power becomes more readily available.
Deepfake videos are far more convincing than just a couple of years ago.
The more we think of algorithms as people, the harder it becomes to tell the difference and the more vulnerable we become to those who would use the technology for harm.
While things aren't likely to get any easier, given the rapid pace of advancement in AI technology, legitimate organizations have an ethical duty to be transparent in their use of AI. AI outpacing policy and governance.
We have to accept that generative AI is here to stay.
Smart assistants can greatly decrease the cognitive load on knowledge workers and they can free up limited human resources to give us more time to focus on larger issues.
That's not to suggest businesses should avoid generative AI and similar technologies.
A dividing line between human and AI. In an ideal world, everything that's AI would be labeled and verifiable as such.
In other words, perhaps we should leave the anthropomorphizing of AI to the malicious actors.


This Cyber News was published on securityintelligence.com. Publication date: Wed, 26 Jun 2024 19:13:05 +0000


Cyber News related to The dangers of anthropomorphizing AI: An infosec perspective

AuditBoard enhances InfoSec Solutions to reduce compliance fatigue across the organization - AuditBoard announced powerful enhancements for its InfoSec Solutions to help organizations meet their IT compliance, cyber risk, and vendor risk management needs in the face of rising risks and increased regulatory requirements. With these new ...
1 month ago Helpnetsecurity.com
The dangers of anthropomorphizing AI: An infosec perspective - The generative AI revolution is showing no signs of slowing down. Chatbots and AI assistants have become an integral part of the business world, whether for training employees, answering customer queries or something else entirely. At the same time, ...
6 days ago Securityintelligence.com
Social Justice: a global perspective - Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals' rights are recognized and protected. I have the distinct honor of leading the ...
4 months ago Feedpress.me
Infosec pros sound off on usefulness of higher education The Register - Half of infosec professionals polled by Kaspersky said any cybersecurity knowledge they picked up from their higher education is at best somewhat useful for doing their day jobs. On the other hand, half said the know-how was at least very useful. The ...
4 months ago Go.theregister.com
Infosec pros sound off on usefulness of higher education The Register - Half of infosec professionals polled by Kaspersky said any cybersecurity knowledge they picked up from their higher education is at best somewhat useful for doing their day jobs. On the other hand, half said the know-how was at least very useful. The ...
4 months ago Theregister.com
What is Certified information Security Manager? Definition from SearchSecurity - Certified Information Security Manager is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security program. CISM is offered by ISACA, a ...
3 months ago Techtarget.com
Introducing ThreatCloud Graph: A Multi-Dimensional Perspective on Cyber Security - In the face of complex and sophisticated cyber threats, enterprises struggle to stay ahead. Addressing this core challenge, Check Point introduces ThreatCloud Graph, focused on proactive prevention of emerging threats. This groundbreaking feature ...
6 months ago Blog.checkpoint.com
Safe shopping this sales season - Whether it's to avoid queuing, save time or simply to avoid the frustration from going to the shop and not finding what you were looking for, online shopping is the most popular shopping method in today's society. That's why we want to give you some ...
5 months ago Pandasecurity.com
Wait, infosec isn't a computer science degree requirement? The Register - Comment There's a line in the latest plea from CISA - the US government's cybersecurity agency - to software developers to do a better job of writing secure code that may make you spit out your coffee. Jack Cable, a CISA senior technical advisor, ...
5 months ago Go.theregister.com
Wait, infosec isn't a computer science degree requirement? The Register - Comment There's a line in the latest plea from CISA - the US government's cybersecurity agency - to software developers to do a better job of writing secure code that may make you spit out your coffee. Jack Cable, a CISA senior technical advisor, ...
5 months ago Theregister.com
Join us at InfoSec Jupyterthon 2024 - Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center tools. Notebooks can be used interactively for threat detection and response, or as automated ...
5 months ago Microsoft.com
Social engineering in the era of generative AI: Predictions for 2024 - Breakthroughs in large language models are driving an arms race between cybersecurity and social engineering scammers. For businesses, generative AI is both a curse and an opportunity. It's not just AI models themselves that cyber criminals are ...
1 month ago Securityintelligence.com
The Dangers of Remote Management & Monitoring Tools for Cybersecurity - Remote monitoring and management (RMM) tools are used by business organizations to manage and monitor their enterprise IT infrastructure from a central location. However, the increasing sophistication of hackers and cybercriminals has caused both ...
1 year ago Csoonline.com
Top 6 benefits of zero-trust security for businesses - Rather than create a framework from scratch, security leaders can choose from the several publicly available methodologies to benefit their own infosec programs. One of the more high-profile examples of available frameworks is the zero-trust security ...
1 month ago Techtarget.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com
Continuous Vulnerability and Exposure Management: Unifying Detection Assessment and Remediation for Elevated IT Security - A typical enterprise Security Operations Center employs a diverse array of security tools to safeguard against cyber threats. This includes Security Information and Event Management for log analysis, firewalls for network traffic control, and ...
4 months ago Cybersecurity-insiders.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)