Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity NewsEnterprise Services

New challenges for AI, data privacy and the 5G hackathon

By Ashvin Kamaraju
SEC1019-cyber-Feat-slide1_900px
June 22, 2020

Businesses have realized the importance of data and the power of harnessing the data to be an insights-driven enterprise. However, there is a trade-off between technology innovation and security.

The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) which are often built with basic security controls, creating a larger attack surface. At the same time, reliance on data means that data breaches can cause greater damage. Moreover, the post-COVID-19 way of working, means that we will likely be more reliant on these technologies which enable us to work and interact from a distance, albeit with less proven security.

Artificial Intelligence (AI) can be the best weapon in a company’s cybersecurity arsenal and, thus, it is becoming increasingly integral to information security. From the multitude of ways AI is used in business to creating safer smart cities and safeguarding transportation, AI impacts nearly every aspect of our lives. In fact, in its Reinventing Cybersecurity with Artificial Intelligence report, Capgemini found that 61 percent of respondents can no longer detect data breach attempts without the help of AI. This perspective informed the decision of 48 percent of the surveyed organizations to increase their digital security spending for AI by an average of 29 percent in 2020.

However, AI is not placed solely in the hands of the good. Malicious actors can and will adopt technologies such as AI and machine learning (ML) faster than the good security leaders can. The use of malicious AI and ML will create new challenges for all businesses wishing to safeguard their most precious asset, data.

Data security is not the only challenge businesses must face. Privacy should also concern business leaders for a handful of reasons, especially in the wake of cyber criminals taking advantage of COVID-19 to hack organizations and monetize stolen identities. Consumers are deeply concerned with how their data is collected and used, including new COVID-19 contact tracing apps. A barrage of news about data breaches, government surveillance, corporate misconduct, deep fakes and biases has soured consumer sentiment on current data practices and has diminished the level of trust people place on new technologies.

In this rapidly changing environment, regulators and national or transnational authorities strive to protect both consumer rights and business innovation by framing strategies and policies towards excellence and trust.

 

What is bias in AI, anyway?

The issue of bias in AI arises from the fact that software products are human creations. The biases of its creators are getting hard-coded into its future. As Fei-Fei Li noted, deep learning systems are “bias in, bias out.” While the algorithms that drive AI may appear to be neutral, the data and applications that shape the outcomes of those algorithms are not. What matters are the people building it, the data they are using, and why they are building it.

Needless to say, AI suffers from bias in all its many applications. That goes for information security, as well. A recent survey from O’Reilly found that 59 percent of respondents didn’t check for fairness, bias or ethical issues while developing their ML models. Not only that, but nearly one in five (19 percent) of organizations revealed that they struggled to adopt AI due to a lack of data, data quality and/or development skills.

These inadequacies ultimately can come together and skew the outcome of an AI-powered security solution. For example, a limited data sample might prevent a tool from flagging certain behavior as suspicious. This false negative could then carry on with its malicious activity, move deeper into the organization’s network and evolve into a security incident without raising any red flags. On the flip side, an improperly tuned algorithm could detect otherwise benign network traffic as malicious, preventing business-critical information from getting through and burdening security teams with unnecessary investigations into false positives.

 

Excising bias from an AI-powered solution

The computer science and AI communities aren’t unaware of bias. In fact, some companies like Google and Microsoft have plans to develop their own ethical guidelines for AI. This is all well and good, but oftentimes these initiatives don’t consider the cultural and social nuances that shape different interpretations of “ethical behavior.”

Another issue is that companies need to follow through on implementing those principles. Unfortunately, that’s not a foregone conclusion. Companies can often change course or sacrifice their idealism to address financial pressures.

Governmental organizations, such as the European Union, have launched initiatives to address the ethical challenges of “trustworthy AI”, although they are still in the consultation stage. Until that, developers and organizations can place themselves ahead of the competition and begin to shift towards ethical AI by reconceiving the modelling process.

As part of this operational shift, it is important to consider social science. This process should involve using more diverse computer scientists, data sources and security teams to protect organizations. Doing so will help account for contextual and perceptual differences, thereby improving the efficiency of algorithms and scope of input data overall. At the same time, these new AI models should also allow for a degree of dynamism so that they can evolve as we change culturally and socially.

Consumer Rights and Privacy Fines

AI is fed with data that is gathered from a handful of sources. A majority of this data is personal and coupled with the inevitable algorithmic bias we discussed earlier, it creates many privacy-related concerns, not only to privacy groups, but to all citizens.

2018 was a breakthrough year for consumer rights and data privacy regulations with the introduction of GDPR. GDPR has made a global impact since every company processing personal data of European citizens is subject to the provisions and requirements of the regulation.

2020 is going to be just as busy from a data protection standpoint. The new California Consumer Privacy Act (CCPA) will be enforced on July 1, 2020 and while the CCPA legislation may not be an omnibus style law like the GDPR, it has been inspired by it, particularly around data subject rights. More countries, like India, are implementing regulations to help with international data exchange, and we can expect to see additional legislation put into place.

Unfortunately, privacy compliance is still lagging. What is certain is that we won’t see all organizations becoming compliant in 2020. It’s still the case that too many companies don’t want to invest in privacy or simply don’t pay enough attention to achieving compliance. As a result, we can expect to see data protection authorities enforcing compliance and levying fines.

Customers are more aware now than ever before of the rights associated with data privacy regulations around the world. And as breaches hit the headlines nearly every week, 2020 will be the year customers start to ask more questions and demand more control over where organizations are storing data and how they are protecting it. Forrester predicts that privacy class-action lawsuits will increase by 300 percent in 2020. As a result, data discovery, classification and remediation by protecting sensitive data through automated workflows will become an important initiative for enterprises.

 

The 5G hackathon

Privacy issues will be compounded even more as a result of the increased connectivity brought on by 5G. The fifth generation of wireless technology is already here. Telecommunications companies in the U.S. have begun rolling out 5G service to major cities, while five countries in the EU have commercial 5G service. More and more consumers are expected to have full access to the technology by the end of next year.

5G technology will make the IoT a greater part of our everyday lives. Growth is expected to explode particularly among outdoor surveillance cameras, smart cities and connected cars, fueled by the ultra-fast 5G network to allow IoT devices to transfer exponentially more information. In fact, Gartner predicts that the 5G IoT endpoint installed base will approach 49 million units by 2023.

While 5G availability is exciting, it brings new cybersecurity challenges that pose threats to the majority of IoT devices. In the rush to beat the competition, security is still an afterthought as opposed to a forethought. This makes the expanded IoT landscape a nightmare for cybersecurity experts who must figure out how to protect cell phones, security systems, vehicles, smart homes, and a variety of other devices from being breached.

Hackers will try to profit from the proliferation of IoT data. In the impending 5G enabled world, attack surfaces will be larger than ever before, providing more opportunities for consumers and businesses to be hacked. In addition, high bandwidth will empower criminals to launch much larger attacks that could cripple entire enterprise networks. Some of the most common types of attacks that companies need to prepare for are botnets, distributed denial of service (DDoS), RFID spoofing, Trojan viruses, malware and malicious scripts.

On the privacy side, matters become more complex. 5G service providers will have extensive access to large amounts of data being sent by user devices, which could show exactly what is happening inside a user’s home. At the very least, metadata could describe their living environment, in-house sensors and parameters, such as temperature, pressure, humidity and so on. Such data could expose a user’s privacy or could be manipulated and misused. In addition, service providers could decide to sell this type of data to other service companies such as advertisers for the purposes of opening up new revenue streams.

 

Security challenges ahead

The global rollout of 5G, and the increasing integration of AI in all forms of daily activities create new security challenges for a trustworthy technology innovation. The absence of a security-by-design and privacy-by-design mindset will make the 2020s a record-breaking decade for cyber-attacks on connected devices, putting consumer privacy at risk. This is especially true given the new post-COVID-19 working environment we are entering. The increase of breaches will result in increased fines for organizations not complying with privacy and security regulations at the federal level. High-tech vendors and government organizations should join forces to develop frameworks that promote excellence and trust, deter threat actors and preserve the features that address what technology was developed for: technical progress and improving the quality of living conditions.

KEYWORDS: 5G artificial intelligence (AI) cyber security data security Internet of Things (IoT)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ashvin kamaraju

Ashvin Kamaraju is Vice President of Engineering at Thales. He leads the product engineering and technology strategy for Thales’ Cloud Protection & Licensing business, leading a global organization of engineers and researchers that develop the technology for the company’s portfolio of industry-leading data protection and access management products and services. Previously Ashvin served as Vice President Global Engineering at Thales eSecurity following its acquisition of Vormetric. Prior to joining Vormetric, Ashvin spent four years as General Manager and Vice President of Engineering at Symantec Corporation, where he led the development of a portfolio of enterprise storage software products. Ashvin is an experienced leader with a proven track record, having more than 25 years of software development experience with domain experience in storage management, operating systems, big data security, encryption and key management.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Cyber 101 Discussion

    A new crystal ball: A view of the trends that will shape 2021

    See More
  • Cybersecurity Intrusion Detection

    Battle at the edge: How the convergence of 5G and IoT are opening a new front for threat actors

    See More
  • SEC0620-Edu-Feat-slide1_900px

    Data Privacy Law and Intellectual Property Considerations for Biometric-Based AI Innovations

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!