Garbage In / Garbage Out: Training AI Algorithms

In little more than a year Artificial Intelligence (AI) has drawn widespread attention to readily available tools like ChatGPT have demonstrated a wide range of personal and professional applications.

Indeed, the rapid advances in AI have revolutionised various industries, unleashing unprecedented opportunities for innovation and growth and this rapid advance has brought numerous benefits and innovations across various sectors. 

An understanding of the risks posed by AI technology, including the significant data security threats that are already having unintended consequences for companies is equally important. This is because AI systems often rely on vast data to train their algorithms and improve performance. 

This data can include personal information such as names, addresses, financial information, and sensitive information such as medical records and social security numbers. The collection and processing of this data can raise concerns about how it is being used and who has access to it. 

AI is driven by data and derives its intelligence from that data and then completes  tasks that it is trained to do. But, just like human beings, if it does not have and use the right information, the outcome could be useless.  

The more complete the data on which an AI is trained, the more valuable the output will be. An AI gains insights from the data and can make predictions, automate processes and perform other tasks that it is trained to do.
This means that the more data we can feed AI, the better. Data storage, which was previously thought a useless expense, is now a valuable asset. 

  • AI-based algorithms are finding genomic markers for rare diseases, directing the discovery of oil and gas deposits, forecasting hurricanes and extreme weather events, alerting us to potential earthquakes or volcanic eruptions, anticipating failures in industrial equipment and alerting us to defects in manufactured goods. 
  • If you ask a generative AI like ChatGPT to write a sonnet in the style of William Shakespeare, it can do a remarkably convincing job because nearly everything The Bard ever wrote is freely available on the Internet.

Recent research suggests that data storage has grown into a $77.5 billion industry, and the demand for cloud storage is only growing. In fact, the cost of data storage has been dropping dramatically in the last year, and the combination of declining storage prices and the availability of very high-powered CPU resources is promoting the boom in AI applications, most of which are running in the cloud.

When data is properly stored in the cloud, businesses can customise AI to their own specific needs for the technology, increasing or decreasing their cloud storage depending on their demands, making AI simple to adjust and implement for different aspects of the company. Nevertheless, once the technology is implemented it is critical that the used information is secure and untampered with, since tampered data can provide false responses, and finding and correcting the false information wastes precious time.

AI is a fast growing technology and as the technology grows so do the threats of cyber attacks. Consequently, organisations must constantly check for breaches and other threats. In particular, organisations should create and store an immutable copy of their data, so in case of a ransomware attack the backup copy is safe from the threat of a breach and cannot be tampered with.

Most ransomware attacks are caused by human error and companies must train their employees  about cyber security best AI practices, and also regularly perform hacker security and simulations.

Successfully incorporating AI will be a critical part of remaining competitive in the future. Those who do not properly adjust their technology and adopt AI risk falling behind. AI stands as an immensely potent tool that promises to revolutionise our decision-making processes, enabling unparalleled access to information at lightning speed. 

Cyber security professionals need to act fast to understand AI risks and ensure that they have the appropriate controls in place, and be flexible enough to adapt as new threats emerge - anything less will place valuable company data at severe risk.

Cloud Security Alliance:   I-HLS:     Brian Gray:    Forbes:       Economic Times:    RM Magazine:   

Image; DeepMind

You Might Also Read: 

AI Will Be Disruptive - For Both Security & Jobs:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Cyber Incidents At British Firms Up 25%
China Is A No Fly Zone For The Australian Prime Minister »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.