Table of Contents
Data governance figures prominently in business plans
Using businesses to prioritize AI security strategies
Home Technology peripherals AI Data protection requires AI-based security strategies

Data protection requires AI-based security strategies

Nov 13, 2023 pm 05:21 PM
AI ai

Data protection requires AI-based security strategies

Only half of respondents said their company’s data security strategy has kept pace with the development of AI. Additionally, despite the recent boom in AI, implementing stronger data governance and security controls will be a higher priority for data teams in 2024.

Data governance figures prominently in business plans

When asked what major initiatives their companies would take over the next 12 months, 80% of respondents cited their top priorities are data security-related initiatives, such as implementing stronger data governance and security controls and modernizing data architecture using new concepts such as data meshes. Only 20% of respondents said integrating artificial intelligence into business processes will Is a top priority

With the rapid rollout of artificial intelligence solutions and the continued push to move data to the cloud, data leaders are being challenged to prioritize data security, agility and visibility. They need to provide both appropriate data protection measures and solutions that can flexibly leverage data to drive value

Without the foundation of a strong data architecture and data security strategy, it is impossible for enterprises to safely integrate AI into their in the process. Business leaders must design an AI-specific security strategy that includes the right protocols and policies to protect data. "Added Carroll, CEO of Immuta.

The rapid advancement of AI and ML is causing excitement and concern across the enterprise. According to the report, employees are already taking advantage of these tools to increase productivity and streamline tasks within their roles. Process. 88% of data professionals say their employees are using AI, and many data professionals believe AI will help them with areas such as anomaly detection (44%) and phishing attack identification (46%) Achieve better outcomes

Using businesses to prioritize AI security strategies

At the same time, many are concerned about the broader security impact of AI on their businesses. 56% of respondents said, Their biggest area of ​​concern is the leakage of sensitive data through AI. This concern increases the need for AI-specific security strategies and tactics so that enterprises can confidently and securely leverage these technologies and roll out AI models at scale

While AI is a top priority for data professionals in every industry, trust, security and compliance remain key priorities for businesses. 88% of data leaders believe data security will be a key issue in the next 12 years Becoming a higher priority within months, ahead of AI. 80% of data professionals say their data protection capabilities are better than a year ago, as data security continues to take center stage for enterprise leaders in today’s ever-changing threat landscape As people's priorities increase, budgets and resources are likely to increase.

As enterprises grow, their structures become more complex and the data they manage becomes richer. Both of these make data security increasingly complex. has become increasingly challenging and important, and has also increased the complexity of data ownership. According to the report, data security across enterprises does not have a clear owner

Respondents indicated that the position most often responsible for data security Be a data privacy or security manager (19%), or chief technology officer (15%). However, many other positions were also noted to be responsible for data security. This lack of ownership creates challenges in collaboratively managing security, which leads to teams Operating in silos and insecure deployments.

According to last year’s report, 63% of data professionals were found to have insufficient visibility into data access controls. Likewise, data access remains a major concern for teams Security barriers: 33% of respondents said a lack of visibility into data sharing and use is their biggest security challenge, resulting in missed business opportunities

Meanwhile, 56% said, Data security processes slow down access to data. This means that more than half of enterprises sacrifice some level of data-driven value to achieve basic security outcomes. They choose to trade agility for trust and compliance

The above is the detailed content of Data protection requires AI-based security strategies. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

How to dynamically create an object through a string and call its methods in Python? How to dynamically create an object through a string and call its methods in Python? Apr 01, 2025 pm 11:18 PM

In Python, how to dynamically create an object through a string and call its methods? This is a common programming requirement, especially if it needs to be configured or run...

How to use Go or Rust to call Python scripts to achieve true parallel execution? How to use Go or Rust to call Python scripts to achieve true parallel execution? Apr 01, 2025 pm 11:39 PM

How to use Go or Rust to call Python scripts to achieve true parallel execution? Recently I've been using Python...

How to solve the problem of missing dynamic loading content when obtaining web page data? How to solve the problem of missing dynamic loading content when obtaining web page data? Apr 01, 2025 pm 11:24 PM

Problems and solutions encountered when using the requests library to crawl web page data. When using the requests library to obtain web page data, you sometimes encounter the...

In the ChatGPT era, how can the technical Q&A community respond to challenges? In the ChatGPT era, how can the technical Q&A community respond to challenges? Apr 01, 2025 pm 11:51 PM

The technical Q&A community in the ChatGPT era: SegmentFault’s response strategy StackOverflow...

How to gracefully handle 'pipe closed' error in Python multi-process Pipe communication? How to gracefully handle 'pipe closed' error in Python multi-process Pipe communication? Apr 01, 2025 pm 11:12 PM

Python multi-process Pipe error "Pipe is closed"? When using the Pipe method in Python's multiprocessing module for parent-child process communication, you may encounter...

What is the reason why pipeline files cannot be written when using Scapy crawler? What is the reason why pipeline files cannot be written when using Scapy crawler? Apr 02, 2025 am 06:45 AM

Discussion on the reasons why pipeline files cannot be written when using Scapy crawlers When learning and using Scapy crawlers for persistent data storage, you may encounter pipeline files...

See all articles