The Problem With Generative AI - Leaky Data

Generative AI has become a crucial tool in the workplace, helping with tasks like summarising meetings, drafting emails, and brainstorming new ideas. It saves time on manual tasks and boosts productivity and efficiency. Many organisations are already starting to see the benefits of using AI.

According to a recent Microsoft survey, 75% of people use AI at work, with 46% having started to use it only in the last six months, highlighting how adoption of AI is growing month after month. 
 
A notable use of AI is in handling large amounts of data. With the rise of the Internet of Things (IoT) and digital transformation, we have more data than ever. Manually processing this data is time-consuming and resource-intensive. AI accelerates this process by recognising patterns and extracting insights from vast data sets. 
 
Benefits and Risks of AI 

To fully maximise usage of AI, most organisations will need to trust external technology providers to help them implement and manage their use of the technology across the enterprise.  While AI has the power to revolutionise the way we work, it also raises important privacy and security concerns. In order to work well, AI requires large amounts of data, which can include sensitive information but running this confidential data through AI puts it at risk of exposure.

Bad actors can bypass the security protections in place to leverage, steal or corrupt the data. Organisations using AI must therefore carefully consider and address these risks.  

Confidential Computing as a Solution 

Confidential computing offers an innovative solution to these security concerns, enhancing the way we use AI by protecting data during processing.  
 
For years, cloud providers have been able to secure data while it is stored or while it is in transit, but data has been left vulnerable while being processed as it must be de-crypted in order to be analysed. Confidential computing solves this problem and expands protection to the data’s entire lifecycle, thereby eliminating vulnerability.

It works by isolating sensitive data in a protected digital space, ensuring that the content, and the techniques used to process it are encrypted and accessible only to authorised code holders.

We’re already seeing many companies turn towards confidential computing, as the global market is projected to grow from USD 14.14 billion in 2024 to USD 208.06 billion by 2032 according to a study from Fortune Business Insights. 
 
In the context of AI, confidential computing allows an organisation to input data into a generative AI model and for the model to process the data securely, without risk of leaks. This means that sensitive information is protected from bad actors and potential data leaks, ensuring that organisations can retain control over their data while using AI. 

The Future of Confidential Computing 

The main challenge with confidential computing is the cost. It requires new systems and a skilled workforce capable of managing the complexity of implementation. Organisations should assess these costs against the advantages of securing data. Today, given the expense involved, confidential computing will be most relevant for critical sectors like government, healthcare, and IT 
 
As the technology advances, companies might collaborate to use confidential computing within a trusted network. In this scenario, each company would effectively ‘rent’ a space for their processing to take place, in a way that limits them to viewing only their own data and not the information of other companies within the network. This approach would reduce costs and enhance security, since company data would be safeguarded, much like a bank protects individual finances. 
 
Confidential computing has the potential to bring significant benefits to many sectors, particularly those handling sensitive information. With more employees leveraging generative AI to help with complex tasks, confidential computing could be the solution to addressing privacy concerns, allowing safe AI usage without fear of data leaks or compromising data protection laws.

The ongoing evolution of this technology promises even more sophisticated uses of AI applications in the coming years.  

Samuel Tourbot is Head of Cloud Communications at Alcatel-Lucent Enterprise 

Image: Ideogram

You Might Also Read: 

ChatGPT - Solving AI’s Privacy Issue:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Phishing Scheme That Generated $11M Taken Down
What The US’s Foggy AI Regulations Mean For Today’s Cyber Compliance »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Cider Security

Cider Security

Cider Security - It’s time to revolutionize the way Security, Dev and DevOps teams work together to supercharge security at the speed of engineering.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.