No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

The straight and narrow — How to keep ML and AI training on track

February 17, 2025
in Protection
0
The straight and narrow — How to keep ML and AI training on track


Artificial intelligence (AI) and machine learning (ML) have entered the enterprise environment.

According to the IBM AI in Action 2024 Report, two broad groups are onboarding AI: Leaders and learners. Leaders are seeing quantifiable results, with two-thirds reporting 25% (or greater) boosts to revenue growth. Learners, meanwhile, say they’re following an AI roadmap (72%), but just 40% say their C-suite fully understands the value of AI investment.

One thing they have in common? Challenges with data security. Despite their success with AI and ML, security remains the top concern. Here’s why.

Full steam ahead: How AI and ML get smarter

Historically, computers did what they were told. Thinking outside the box wasn’t an option — lines of code dictated what was possible and permissible.

AI and ML models take a different approach. Instead of rigid structures, AI and ML models are given general guidelines. Companies supply vast amounts of training data that help these models “learn,” in turn improving their output.

A simple example is an AI tool designed to identify images of dogs. The underlying ML structures provide basic guidance — dogs have four legs, two ears, a tail and fur. Thousands of images of both dogs and not-dogs are provided to AI. The more pictures it “sees,” the better it becomes at differentiating dogs.

Learn more about today’s AI leaders

Off the rails: The risks of unauthorized model modification

If attackers can gain access to AI models, they can modify model outputs. Consider the example above. Malicious actors compromise business networks and flood training models with unlabeled images of cats and images incorrectly labeled as dogs. Over time, model accuracy suffers and outputs are no longer reliable.

Forbes highlights a recent competition that saw hackers trying to “jailbreak” popular AI models and trick them into producing inaccurate or harmful content. The rise of generative tools makes this kind of protection a priority — in 2023, researchers discovered that by simply adding strings of random symbols to the end of queries, they could convince generative AI (gen AI) tools to provide answers that bypassed model safety filters.

And this concern isn’t just conceptual. As noted by The Hacker News, an attack technique known as “Sleepy Pickle” poses significant risks for ML models. By inserting a malicious payload into pickle files — used to serialize Python object structures — attackers can change how models weigh and compare data and alter model outputs. This could allow them to generate misinformation that causes harm to users, steal user data or generate content that contains malicious links.

Staying the course: Three components for better security

To reduce the risk of compromised AI and ML, three components are critical:

1) Securing the data

Accurate, timely and reliable data underpins usable model outputs. The process of centralizing and correlating this data, however, creates a tempting target for attackers. If they can infiltrate large-scale AI data storage, they can manipulate model outputs.

As a result, enterprises need solutions that automatically and continuously monitor AI infrastructure for signs of compromise.

2) Securing the model

Changes to AI and ML models can lead to outputs that look legitimate but have been modified by attackers. At best, these outputs inconvenience customers and slow down business processes. At worst, they could negatively impact both reputation and revenue.

To reduce the risk of model manipulation, organizations need tools capable of identifying security vulnerabilities and detecting misconfigurations.

3) Securing the usage

Who’s using models? With what data? And for what purpose? Even if data and models are secured, use by malicious actors may put companies at risk. Continuous compliance monitoring is critical to ensure legitimate use.

Making the most of models

AI and ML tools can help enterprises discover data insights and drive increased revenue. If compromised, however, models can be used to deliver inaccurate outputs or deploy malicious code.

With Guardium AI security, businesses are better equipped to manage the security risks of sensitive models. See how.

Editorial Team

Editorial Team

Related Posts

You Might Have Sent Your ChatGPT Conversations to Google
Protection

You Might Have Sent Your ChatGPT Conversations to Google

August 4, 2025
The M1 MacBook Air Is Down to $600 Right Now
Protection

The M1 MacBook Air Is Down to $600 Right Now

August 3, 2025
Apple's Latest Security Patch Fixes a Zero-Day Vulnerability Targeting Chrome
Protection

Apple’s Latest Security Patch Fixes a Zero-Day Vulnerability Targeting Chrome

August 2, 2025
Why You Can't Rely on Skechers' AirTag Sneakers to Track Your Kids
Protection

Why You Can’t Rely on Skechers’ AirTag Sneakers to Track Your Kids

August 1, 2025
There's Already a Class Action Lawsuit Against the Viral 'Tea' App
Protection

There’s Already a Class Action Lawsuit Against the Viral ‘Tea’ App

July 31, 2025
The LTE Galaxy Watch 6 Classic Is Nearly 60% Off
Protection

The LTE Galaxy Watch 6 Classic Is Nearly 60% Off

July 30, 2025
Load More
Next Post
Bloomberg

Xi-Jack Ma Chat Seen as Next Catalyst for Blistering China Rally

Popular News

  • The 10 best banks for college students in 2025

    The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • Solana-based DeFi lender CrediX exploited; attacker granted admin access and drained liquidity pool

    0 shares
    Share 0 Tweet 0
  • How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • Western Union Turns Bullish on Stablecoins Amid US Regulation

    0 shares
    Share 0 Tweet 0
  • 5 Things to Know About the Lane Health Healthcare Spending Card

    0 shares
    Share 0 Tweet 0

Latest News

INNBeauty Project Recharge Gel Cream Moisturizer Review

INNBeauty Project Recharge Gel Cream Moisturizer Review

August 4, 2025
0

“There’s a common myth that gel creams are only for oily or acne-prone skin, but that doesn’t hold up with...

Client Challenge

Client Challenge

August 4, 2025
0

Client Challenge JavaScript is disabled in your browser. Please enable JavaScript to proceed. A required part of this site couldn’t...

You Might Have Sent Your ChatGPT Conversations to Google

You Might Have Sent Your ChatGPT Conversations to Google

August 4, 2025
0

When you start a conversation with ChatGPT, you probably don't expect that chat to end up discoverable in a Google...

broker-clients

Lee Coates: A practical guide to sustainable investment conversations

August 4, 2025
0

As sustainability becomes an increasingly prominent consideration in investment decision-making, financial advisers are faced with a dual responsibility: supporting client...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.