The world convenes to discuss AI protections and policies amid growing data asymmetries

Speaking at the World Economic Forum a few days ago, Liz Centoni explained a wide-angle view that it's about the data that feeds AI models.
Data and context to customize AI models derives distinction, and AI needs large amounts of quality data to produce accurate, reliable, insightful output.
Some of the work that's needed to make data trustworthy includes cataloging, cleaning, normalizing, and securing it.
It's underway, and AI is making it easier to unlock vast data potential.
AI has and will continue to be front-page news in the year to come, and that means data will also be in the spotlight.
Data is the backbone and the differentiator for AI, and it is also the area where readiness is the weakest.
The AI Readiness Index reveals that 81% of all organizations claim some degree of siloed or fragmented data.
While siloed data has long been understood as a barrier to information sharing, collaboration, and holistic insight and decision making in the enterprise, the AI quotient adds a new dimension.
With the rise in data complexity, it can be difficult to coordinate workflows and enable better synchronization and efficiency.
Leveraging data across silos will require data lineage tracking so that only the approved and relevant data is used, and AI model output can be explained and tracked to training data.
We'll look back a year from now and see 2024 as the beginning of the end of data silos.
Emerging regulations and harmonization of rules on fair access to and use of data, such as the EU Data Act which becomes fully applicable next year, are the beginning of another facet of the AI revolution that will pick up steam this year.
Unlocking massive economic potential and significantly contributing to a new market for data itself, these mandates will benefit both ordinary citizens and businesses who will access and reuse the data generated by their usage of products and services.
According to the World Economic Forum, the amount of data generated globally in 2025 is predicted to be 463 exabytes per day, every day.
The sheer amount of business-critical data being created around the world is outpacing our ability to process it.
It may seem counterintuitive that as AI systems continue to consume more and more data, available public data will soon hit a ceiling and high-quality language data will likely be exhausted by 2026 according to some estimates.
Both private and synthetic data, as with any data that is not validated, can also lead to bias in AI systems.
Misuse of private data can have serious consequences such as identity theft, financial loss, and reputation damage.
Organizations must ensure they have data governance policies, procedures, and guidelines in place, aligned with AI responsibility frameworks, to guard against these threats.
Recognizing the urgency that AI brings to the equation, the processes and structures that facilitate data sharing among companies, society, and the public sector will be under intense scrutiny.


This Cyber News was published on feedpress.me. Publication date: Fri, 26 Jan 2024 13:13:04 +0000


Cyber News related to The world convenes to discuss AI protections and policies amid growing data asymmetries

The world convenes to discuss AI protections and policies amid growing data asymmetries - Speaking at the World Economic Forum a few days ago, Liz Centoni explained a wide-angle view that it's about the data that feeds AI models. Data and context to customize AI models derives distinction, and AI needs large amounts of quality data to ...
5 months ago Feedpress.me
Create Highly Secure Applications in Mule 4 - Accessibility Control/Access Management Use Anypoint Access Management to create your Anypoint Platform account or configure a federated External Identity. Environment Management Anypoint Platform enables you to create and manage separate deployment ...
4 months ago Feeds.dzone.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
3 months ago Feeds.dzone.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
3 months ago Venturebeat.com
DP World confirms data stolen in cyberattack, no ransomware used - International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. The company says no ransomware payloads or encryption was used in the attack. On November ...
7 months ago Bleepingcomputer.com
Microsoft will roll out MFA-enforcing policies for admin portal access - Microsoft will soon start rolling out Conditional Access policies requiring multifactor authentication from administrators when signing into Microsoft admin portals such as Microsoft Entra, Microsoft 365, Exchange, and Azure. The company will also ...
7 months ago Bleepingcomputer.com
Protect Your Data: Why Data Is More Valuable Than You Realize - Data is more valuable than you realize, and protecting it should always be a top priority. Data privacy has never been more important, and organizations need to understand the risks of data exposure and implement measures to protect against data ...
1 year ago Welivesecurity.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
6 months ago Securityzap.com
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
5 months ago Securityzap.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
5 months ago Securityzap.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
6 months ago Helpnetsecurity.com
Americans Deserve More Than the Current American Privacy Rights Act - EFF is concerned that a new federal bill would freeze consumer data privacy protections in place, by preempting existing state laws and preventing states from creating stronger protections in the future. The bill should limit sharing with the ...
2 months ago Eff.org
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity - COMMENTARY. Global data privacy laws were created to address growing consumer concerns about individual privacy. These laws include several best practices for businesses about storing and using consumers' personal data so that the exposure of ...
7 months ago Darkreading.com
Indian IT Leaders Identify Security Gap in Data Policies - A recent study by Rubrik, a US-based data security firm, has bare concerning reality within the Indian IT sector: an alarming 49% of IT leaders feel that security remains a glaring omission within their organization's data policies. This discovery ...
6 months ago Securityboulevard.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
6 months ago Securityboulevard.com
Detectify platform enhancements address growing attack surface complexity - Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy ...
1 month ago Helpnetsecurity.com
How To Implement Data Management Into Your AI Strategy - While an AI strategy has different components, including infrastructure, technology stack, organizational changes, and more, the most important is the data strategy. A well-defined data strategy is the foundation for successful AI implementation. AI ...
6 months ago Feeds.dzone.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
6 months ago Microsoft.com
Business Data Encryption: Protecting Sensitive Information - In addition to implementing encryption technologies and policies, organizations should prioritize employee training on data encryption. By selecting the appropriate encryption technologies, implementing strong encryption policies, and training ...
4 months ago Securityzap.com
Change From Within: 3 Cybersecurity Transformation Traps for CISOs to Avoid - Whether they're earned or not, there are certain stigmas associated with chief information security officers: They work in isolation, with only a vague sense of how various departments contribute to the organization's greater good. Does this describe ...
7 months ago Darkreading.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
6 months ago Esecurityplanet.com
Data Privacy and Security - Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and ...
7 months ago Feeds.dzone.com
US Agencies Failing to Oversee Ransomware Protections - The White House's goal of bolstering the cyber resilience of critical infrastructure is being threatened by US federal agencies' lack of oversight of ransomware protections, according to a new Government Accountability Office report. The GAO noted ...
5 months ago Infosecurity-magazine.com
Privacy Isn't Dead. Far From It. - EFF is one of dozens, if not hundreds, of organizations that work to protect privacy. Millions of people read EFF's website each year, and tens of millions use the tools we've made, like Privacy Badger. Privacy is one of EFF's biggest concerns, and ...
4 months ago Eff.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)