How secure are your AI and machine learning projects?

    Date02 Sep 2019
    1465
    Posted ByBrittany Day
    Cso Silhouettes Overlaid With A Circular Maze Shared Perspective Empathy Collaboration Teamwork By Imrsquid Gettyimages 913381428 Security And Coding Background By Matejmo Gettyimages 901630486 3x2 2400x1600 100796445 Large3x2

    Does your company utilize AI or ML? Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Learn how several companies have minimized their risk in this informative CSO article:

    When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers and internal users as quickly as possible and at the lowest cost. Good security can be slow and expensive.

    Artificial intelligence (AI) and machine learning (ML) offer all the same opportunities for vulnerabilities and misconfigurations as earlier technological advances, but they also have unique risks. As enterprises embark on major AI-powered digital transformations, those risks may become greater than what we've seen before.

    AI and ML require more data, and more complex data, than other technologies. The algorithms used have been developed by mathematicians and data scientists and come out of research projects. Meanwhile, the volume and processing requirements mean that the workloads are typically handled by cloud platforms, which add yet another level of complexity and vulnerability.

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":51.32,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.47,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"26","type":"x","order":"3","pct":34.21,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.