Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Minimizing data breaches from human error with randomized re-representations

By Hector Leano
artificial intelligence AI graphic

Image via Pixabay

September 1, 2023

The accelerated adoption of artificial intelligence (AI) technology in businesses has heightened data risks, with more volumes of data in transit and AI-assisted black hat actors, amongst other reasons. Interestingly, the primary risk is not intricate hacking techniques but human error. 

The 2022 Cost of a Data Breach Report from IBM and the Ponemon Institute finds that human error accounts for 21% of data breaches. Human error can include a wide range of mistakes, from configuration errors in technology systems to simple mishaps like sending sensitive information to the wrong person.

Imagine if we could secure data by making it unreadable to humans.

It's time to look at modern solutions that go beyond traditional encryption or firewall protection. A determined bad actor can use advanced analytics to unlock conventional encryptions, tokens and data masking techniques. Data needs to be sent to different parties for AI to run on, which involves giving up data ownership across firewalls. Moreover, AI models are distinctly susceptible to specific attacks aimed at extracting sensitive data by AI-assisted black hat parties.

One solution gaining momentum in the realm of AI data security is Randomized Re-Representations, a new concept that ensures data remains indecipherable to humans, significantly reducing the risk of breaches caused by human errors.

The human factor in data security

Despite the best defensive mechanisms in place, unintentional mishandling or deliberate leaks pose a constant threat to data security. This is particularly problematic when data needs to be shared with third parties for purposes such as machine learning. 

In such cases, sensitive data often leaves the realm of the owner's control in plain-text format, making it vulnerable to potential breaches. For instance, human data labelers in 2022 inadvertently leaked sensitive user images from test robot vacuums, highlighting the need for solutions that can reduce the impact of such leaks.

Taking control with randomized re-representations

Randomized Re-Representation is a promising technology developed to tackle this issue head-on. It transforms raw data into a randomized format that is intelligible only to a specific AI model, rendering the data useless to another human or machine if leaked. This is a one-way, irreversible transformation that cannot be decrypted. 

For instance, consider the infamous Equifax data breach that exposed the personal information of millions due to human error. If the exposed data had been in the form of Randomized Re-Representations, the breach's impact would have been drastically diminished.

Insisting on non-plain-text data

To effectively mitigate the impact of data breaches, it's crucial to insist on data never appearing in a plain-text form, even when encrypted or decrypted for operation. As an increasing number of businesses utilize Large Language Models (LLMs) or Foundation Models, maintaining data ownership while sharing data for training or fine-tuning these models is crucial. Some third-party solutions employ Randomized Re-Representation, ensuring your data remains under your control and never appears in a plain-text format. This novel concept guarantees the protection of your data even during transfer, providing an added layer of security.

AI and machine learning: Minimizing human involvement

You may question, "Don't humans need to interpret the data eventually?" Yes, perhaps when a regulator or authority needs to inspect the data. Otherwise, AI and machine learning play pivotal roles in reducing human involvement in data interpretation. These systems can be trained to decipher and analyze data, removing the need for human involvement and minimizing data leak risks. For example, some companies are already leveraging AI to create Randomized Re-Representations of sensitive data, thus enabling safe and secure data analysis.

Future prospects

Adopting advanced data security models like Randomized Re-Representation is not without challenges, but with a combination with existing data governance and controls, businesses can create a robust data security environment that addresses the human risk factor effectively.

Human error represents a significant data security concern. By converting data into a format that is indecipherable to humans but readable by specific AI, we can address a large share of data security threats. This technology's implementation hints at a promising shift in data security approaches — one that acknowledges and tackles the human risk factor head-on.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security data breaches data security human error machine learning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Hector

Hector Leano is a product marketing leader specializing in data analytics, AI and machine learning.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity

    A Fourth of Data Breaches Attributed to Human Error

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    3 simple steps to protect data from human error

    See More
  • SEC_Web_5Minutes-Yogman-1221_1170x658.jpg

    5 minutes with Jann Yogman: The cure for human error? Comedy.

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Optimizing Social Media from a B2B Perspective

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing