Garbage In / Garbage Out: Training AI Algorithms

In little more than a year Artificial Intelligence (AI) has drawn widespread attention to readily available tools like ChatGPT have demonstrated a wide range of personal and professional applications.

Indeed, the rapid advances in AI have revolutionised various industries, unleashing unprecedented opportunities for innovation and growth and this rapid advance has brought numerous benefits and innovations across various sectors. 

An understanding of the risks posed by AI technology, including the significant data security threats that are already having unintended consequences for companies is equally important. This is because AI systems often rely on vast data to train their algorithms and improve performance. 

This data can include personal information such as names, addresses, financial information, and sensitive information such as medical records and social security numbers. The collection and processing of this data can raise concerns about how it is being used and who has access to it. 

AI is driven by data and derives its intelligence from that data and then completes  tasks that it is trained to do. But, just like human beings, if it does not have and use the right information, the outcome could be useless.  

The more complete the data on which an AI is trained, the more valuable the output will be. An AI gains insights from the data and can make predictions, automate processes and perform other tasks that it is trained to do.
This means that the more data we can feed AI, the better. Data storage, which was previously thought a useless expense, is now a valuable asset. 

  • AI-based algorithms are finding genomic markers for rare diseases, directing the discovery of oil and gas deposits, forecasting hurricanes and extreme weather events, alerting us to potential earthquakes or volcanic eruptions, anticipating failures in industrial equipment and alerting us to defects in manufactured goods. 
  • If you ask a generative AI like ChatGPT to write a sonnet in the style of William Shakespeare, it can do a remarkably convincing job because nearly everything The Bard ever wrote is freely available on the Internet.

Recent research suggests that data storage has grown into a $77.5 billion industry, and the demand for cloud storage is only growing. In fact, the cost of data storage has been dropping dramatically in the last year, and the combination of declining storage prices and the availability of very high-powered CPU resources is promoting the boom in AI applications, most of which are running in the cloud.

When data is properly stored in the cloud, businesses can customise AI to their own specific needs for the technology, increasing or decreasing their cloud storage depending on their demands, making AI simple to adjust and implement for different aspects of the company. Nevertheless, once the technology is implemented it is critical that the used information is secure and untampered with, since tampered data can provide false responses, and finding and correcting the false information wastes precious time.

AI is a fast growing technology and as the technology grows so do the threats of cyber attacks. Consequently, organisations must constantly check for breaches and other threats. In particular, organisations should create and store an immutable copy of their data, so in case of a ransomware attack the backup copy is safe from the threat of a breach and cannot be tampered with.

Most ransomware attacks are caused by human error and companies must train their employees  about cyber security best AI practices, and also regularly perform hacker security and simulations.

Successfully incorporating AI will be a critical part of remaining competitive in the future. Those who do not properly adjust their technology and adopt AI risk falling behind. AI stands as an immensely potent tool that promises to revolutionise our decision-making processes, enabling unparalleled access to information at lightning speed. 

Cyber security professionals need to act fast to understand AI risks and ensure that they have the appropriate controls in place, and be flexible enough to adapt as new threats emerge - anything less will place valuable company data at severe risk.

Cloud Security Alliance:   I-HLS:     Brian Gray:    Forbes:       Economic Times:    RM Magazine:   

Image; DeepMind

You Might Also Read: 

AI Will Be Disruptive - For Both Security & Jobs:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Incidents At British Firms Up 25%
China Is A No Fly Zone For The Australian Prime Minister »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

Paradyn

Paradyn

Paradyn-managed security services can provide a holistic view of your business environment, no matter how simple or complex it is.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.