Garbage In / Garbage Out: Training AI Algorithms

In little more than a year Artificial Intelligence (AI) has drawn widespread attention to readily available tools like ChatGPT have demonstrated a wide range of personal and professional applications.

Indeed, the rapid advances in AI have revolutionised various industries, unleashing unprecedented opportunities for innovation and growth and this rapid advance has brought numerous benefits and innovations across various sectors. 

An understanding of the risks posed by AI technology, including the significant data security threats that are already having unintended consequences for companies is equally important. This is because AI systems often rely on vast data to train their algorithms and improve performance. 

This data can include personal information such as names, addresses, financial information, and sensitive information such as medical records and social security numbers. The collection and processing of this data can raise concerns about how it is being used and who has access to it. 

AI is driven by data and derives its intelligence from that data and then completes  tasks that it is trained to do. But, just like human beings, if it does not have and use the right information, the outcome could be useless.  

The more complete the data on which an AI is trained, the more valuable the output will be. An AI gains insights from the data and can make predictions, automate processes and perform other tasks that it is trained to do.
This means that the more data we can feed AI, the better. Data storage, which was previously thought a useless expense, is now a valuable asset. 

  • AI-based algorithms are finding genomic markers for rare diseases, directing the discovery of oil and gas deposits, forecasting hurricanes and extreme weather events, alerting us to potential earthquakes or volcanic eruptions, anticipating failures in industrial equipment and alerting us to defects in manufactured goods. 
  • If you ask a generative AI like ChatGPT to write a sonnet in the style of William Shakespeare, it can do a remarkably convincing job because nearly everything The Bard ever wrote is freely available on the Internet.

Recent research suggests that data storage has grown into a $77.5 billion industry, and the demand for cloud storage is only growing. In fact, the cost of data storage has been dropping dramatically in the last year, and the combination of declining storage prices and the availability of very high-powered CPU resources is promoting the boom in AI applications, most of which are running in the cloud.

When data is properly stored in the cloud, businesses can customise AI to their own specific needs for the technology, increasing or decreasing their cloud storage depending on their demands, making AI simple to adjust and implement for different aspects of the company. Nevertheless, once the technology is implemented it is critical that the used information is secure and untampered with, since tampered data can provide false responses, and finding and correcting the false information wastes precious time.

AI is a fast growing technology and as the technology grows so do the threats of cyber attacks. Consequently, organisations must constantly check for breaches and other threats. In particular, organisations should create and store an immutable copy of their data, so in case of a ransomware attack the backup copy is safe from the threat of a breach and cannot be tampered with.

Most ransomware attacks are caused by human error and companies must train their employees  about cyber security best AI practices, and also regularly perform hacker security and simulations.

Successfully incorporating AI will be a critical part of remaining competitive in the future. Those who do not properly adjust their technology and adopt AI risk falling behind. AI stands as an immensely potent tool that promises to revolutionise our decision-making processes, enabling unparalleled access to information at lightning speed. 

Cyber security professionals need to act fast to understand AI risks and ensure that they have the appropriate controls in place, and be flexible enough to adapt as new threats emerge - anything less will place valuable company data at severe risk.

Cloud Security Alliance:   I-HLS:     Brian Gray:    Forbes:       Economic Times:    RM Magazine:   

Image; DeepMind

You Might Also Read: 

AI Will Be Disruptive - For Both Security & Jobs:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Incidents At British Firms Up 25%
China Is A No Fly Zone For The Australian Prime Minister »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

Surfshark

Surfshark

Surfshark is a cybersecurity company focused on developing humanized privacy & security protection solutions to secure people's digital lives.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.