Garbage In / Garbage Out: Training AI Algorithms

In little more than a year Artificial Intelligence (AI) has drawn widespread attention to readily available tools like ChatGPT have demonstrated a wide range of personal and professional applications.

Indeed, the rapid advances in AI have revolutionised various industries, unleashing unprecedented opportunities for innovation and growth and this rapid advance has brought numerous benefits and innovations across various sectors. 

An understanding of the risks posed by AI technology, including the significant data security threats that are already having unintended consequences for companies is equally important. This is because AI systems often rely on vast data to train their algorithms and improve performance. 

This data can include personal information such as names, addresses, financial information, and sensitive information such as medical records and social security numbers. The collection and processing of this data can raise concerns about how it is being used and who has access to it. 

AI is driven by data and derives its intelligence from that data and then completes  tasks that it is trained to do. But, just like human beings, if it does not have and use the right information, the outcome could be useless.  

The more complete the data on which an AI is trained, the more valuable the output will be. An AI gains insights from the data and can make predictions, automate processes and perform other tasks that it is trained to do.
This means that the more data we can feed AI, the better. Data storage, which was previously thought a useless expense, is now a valuable asset. 

  • AI-based algorithms are finding genomic markers for rare diseases, directing the discovery of oil and gas deposits, forecasting hurricanes and extreme weather events, alerting us to potential earthquakes or volcanic eruptions, anticipating failures in industrial equipment and alerting us to defects in manufactured goods. 
  • If you ask a generative AI like ChatGPT to write a sonnet in the style of William Shakespeare, it can do a remarkably convincing job because nearly everything The Bard ever wrote is freely available on the Internet.

Recent research suggests that data storage has grown into a $77.5 billion industry, and the demand for cloud storage is only growing. In fact, the cost of data storage has been dropping dramatically in the last year, and the combination of declining storage prices and the availability of very high-powered CPU resources is promoting the boom in AI applications, most of which are running in the cloud.

When data is properly stored in the cloud, businesses can customise AI to their own specific needs for the technology, increasing or decreasing their cloud storage depending on their demands, making AI simple to adjust and implement for different aspects of the company. Nevertheless, once the technology is implemented it is critical that the used information is secure and untampered with, since tampered data can provide false responses, and finding and correcting the false information wastes precious time.

AI is a fast growing technology and as the technology grows so do the threats of cyber attacks. Consequently, organisations must constantly check for breaches and other threats. In particular, organisations should create and store an immutable copy of their data, so in case of a ransomware attack the backup copy is safe from the threat of a breach and cannot be tampered with.

Most ransomware attacks are caused by human error and companies must train their employees  about cyber security best AI practices, and also regularly perform hacker security and simulations.

Successfully incorporating AI will be a critical part of remaining competitive in the future. Those who do not properly adjust their technology and adopt AI risk falling behind. AI stands as an immensely potent tool that promises to revolutionise our decision-making processes, enabling unparalleled access to information at lightning speed. 

Cyber security professionals need to act fast to understand AI risks and ensure that they have the appropriate controls in place, and be flexible enough to adapt as new threats emerge - anything less will place valuable company data at severe risk.

Cloud Security Alliance:   I-HLS:     Brian Gray:    Forbes:       Economic Times:    RM Magazine:   

Image; DeepMind

You Might Also Read: 

AI Will Be Disruptive - For Both Security & Jobs:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Incidents At British Firms Up 25%
China Is A No Fly Zone For The Australian Prime Minister »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Cleafy

Cleafy

Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity at scale.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.