The public availability of GenAI landing in 2022 fundamentally changed the way individuals, and businesses, carry on with their pre-GenAI way of life. Tabling theThe public availability of GenAI landing in 2022 fundamentally changed the way individuals, and businesses, carry on with their pre-GenAI way of life. Tabling the

Make AI Safe, Before You Make It Smart

2025/12/20 03:23
6 min di lettura
Per feedback o dubbi su questo contenuto, contattateci all'indirizzo crypto.news@mexc.com.

The public availability of GenAI landing in 2022 fundamentally changed the way individuals, and businesses, carry on with their pre-GenAI way of life. Tabling the opinions if hype or immediate value, for the moment, the disruptive force was unparallel in history. The unprecedent rate of adoption led businesses to assess if investments, and strategy needed to evolve in haste.  

In 2025, we have seen not only massive diversity in the application of AI capabilities across all industries, but also a rapid evolution of the technology provided by vendors, which continues at a pace the world is barely able to keep up with. At a time when research has indicated that  95% of AI projects fail, how can security, compliance and risk teams help shepherd their organisations’ adoption of AI while minimising inadvertent risk exposures that could be exploited by criminals or trigger regulatory scrutiny and penalties?   

Each new development in AI pushes to challenge cybersecurity readiness. However, the hype should not distract cybersecurity professionals from the bottom line: if AI isn’t properly governed, and built with security from the ground up, the odds of negative outcomes will far outweigh the ability of security teams to keep up. 

The importance of Secure-by-Design’ in cybersecurity AI 

‘Secure-by-design’ is more than a marketing slogan. It is the principle that culture must be celebrated with security baked in from the ground up, as opposed to being bolted on as a patch or an afterthought. In practice, this means technology must be designed to reasonably protect against malicious actors, safeguard sensitive data and defend the connected infrastructure that organisations rely on.  

AI introduces new stakes. Given that AI systems make decisions at scale and access massive datasets, any flaw or misconfiguration within the code can have far-reaching consequences. Organisations now face nearly 2,000 attacks per week, with the average breach costing $4.88 million. As AI becomes increasingly central to operations, a single vulnerability could lead to significant disruptions in business operations.  

Too often, companies fail to apply rigorous oversight to how AI systems are built, trained and deployed. AI also doesn’t operate in a vacuum. Most organisations rely on third-party vendors and external services for their AI solutions, which means secure-by-design needs to extend across an organisation’s entire supply chain. Every tool or platform introduced without strong safeguards increases the attack surface of an organisation, meaning that as digital ecosystems expand, so do the opportunities for threat actors to exploit increasing vulnerabilities. 

But organisations that make AI secure from the very beginning go beyond just protecting critical processes and information; rather, they create systems they can trust to innovate safely. In addition, regulators and industry standards are starting to demand this approach, making secure-by-design AI both a strategic and operational imperative.  

Overall, AI promises smarter defences, but if it’s not made secure by design, it risks becoming a bigger liability than the problems it’s supposed to solve.  

Using AI to strengthen cyber defences without compromising data privacy 

Traditional defences often miss what looks like “noise.” AI-powered systems built on secure-by-design principles can turn that noise into insight. Deep learning and Natural Language Processing (NLP) can correlate seemingly unrelated events, such as unusual login attempts and abnormal network traffic, to identify complex attack patterns.  

One of the big misconceptions, however, is that using AI for cybersecurity requires sharing large amounts of sensitive regulatory and compliance data. However, this shouldn’t be the case. Modern AI-powered Security Information and Event Management (SIEM) systems are designed to keep that data secure while they analyse enormous data volumes in real time using machine learning algorithms that establish baselines of “normal” behaviour and flag anomalies with exceptional precision.  

Extended Detection and Response (XDR) platforms further illustrate this shift toward AI-driven cybersecurity that is secure by design. By aggregating data from networks, cloud environments, endpoints and identity systems into a unified view, these platforms enable advanced behavioural analytics that continuously monitor user and entity activity. This modelling helps define normal behaviour across the digital ecosystem, allowing security teams to detect anomalies early, without compromising data privacy.   

To ensure AI is both effective and compliant, organisations should also apply a few practical deployment principles. Prioritise building tools that automate internal processes rather than directly analysing customer data. Wherever possible, process data locally rather than in external cloud analysis to reduce exposure risks. 

By embedding responsible AI practices and aligning them with GDPR requirements like data minimisation, purpose limitation, and accountability, these platforms operate in a compliant and ethical manner. Additionally, they should take emerging standards like the EU AI Act into account. Together, these platforms enable real-time threat response without compromising user trust or data integrity. 

Finally, AI deployment should be underpinned by clear contractual safeguards. That means data processing agreements that define how information is handled and retained, vendor warranties that guarantee customer data won’t be repurposed for training, and well-defined breach notification terms. Without these protections, even the most sophisticated AI risks becoming a compliance headache.  

When implemented responsibly, XDR can support GDPR compliance and reinforce trust in AI-powered defences. 

The bottom line 

AI in cybersecurity is no longer optional; threat actors have already embraced AI. They’re running automated phishing campaigns, developing adaptive malware designed to outsmart traditional defences, and deploying real-time evasion techniques.  

Defenders need to catch up while also ensuring compliance and maintaining digital trust. Traditional signature-based detection misses advanced threats that behavioural AI catches with 98% accuracy. The question isn’t whether cybersecurity teams should adopt AI, it’s how AI can be adopted effectively and securely before attackers gain a permanent advantage. The answer lies in deploying AI in ways that strengthen defences without introducing new risks.  

The winning approach is straightforward: build secure by design tools, not data pipelines. Use AI to generate scripts, create dashboards, and automate configurations while keeping sensitive data local rather than processing this data elsewhere. Organisations that master this tool-building approach will gain AI’s defensive advantages without the compliance headaches, regulatory penalties, or customer trust issues that come with external data sharing or exposed attack surfaces. 

Opportunità di mercato
Logo null
Valore null (null)
--
----
USD
Grafico dei prezzi in tempo reale di null (null)
Disclaimer: gli articoli ripubblicati su questo sito provengono da piattaforme pubbliche e sono forniti esclusivamente a scopo informativo. Non riflettono necessariamente le opinioni di MEXC. Tutti i diritti rimangono agli autori originali. Se ritieni che un contenuto violi i diritti di terze parti, contatta crypto.news@mexc.com per la rimozione. MEXC non fornisce alcuna garanzia in merito all'accuratezza, completezza o tempestività del contenuto e non è responsabile per eventuali azioni intraprese sulla base delle informazioni fornite. Il contenuto non costituisce consulenza finanziaria, legale o professionale di altro tipo, né deve essere considerato una raccomandazione o un'approvazione da parte di MEXC.

Potrebbe anche piacerti

Gold rises on softer US Dollar, traders await Trump’s address on Iran war

Gold rises on softer US Dollar, traders await Trump’s address on Iran war

The post Gold rises on softer US Dollar, traders await Trump’s address on Iran war appeared on BitcoinEthereumNews.com. Gold price (XAU/USD) extends the rally to
Condividi
BitcoinEthereumNews2026/04/02 07:44
Fed Hold in April Remains the Market Base Case

Fed Hold in April Remains the Market Base Case

The post Fed Hold in April Remains the Market Base Case appeared on BitcoinEthereumNews.com. The Federal Reserve held interest rates steady on March 18, 2026, and
Condividi
BitcoinEthereumNews2026/04/02 07:21
Chorus One and MEV Zone Team Up to Boost Avalanche Staking Rewards

Chorus One and MEV Zone Team Up to Boost Avalanche Staking Rewards

The post Chorus One and MEV Zone Team Up to Boost Avalanche Staking Rewards appeared on BitcoinEthereumNews.com. Through the partnership with MEV Zone, Chorus One users will earn extra yield automatically. The Chorus One Avalanche node has a total stake of over 1.7 million, valued at around $55 million. This collaboration will introduce MEV Zone to both public nodes and Validator-as-a-Service. The Avalanche network stands to benefit from fairer and more efficient markets due to enhanced transparency. Chorus One, a highly decorated institutional-grade staking provider, has inked a strategic partnership with MEV Zone to enhance yield generation on the Avalanche (AVAX) network. The Chorus One partnered with MEV Zone to increase the AVAX staking yields, while simultaneously contributing to the general growth of the Avalanche network. “At Chorus One, we see this as an important step in our ongoing journey to provide robust infrastructure and innovative yield strategies for our partners and clients,” the announcement noted.  Why Did Chorus One Partner With MEV Zone? The Chorus One platform has grown to a top-tier institutional-grade staking ecosystem, with more than 40 blockchains, since 2018. In a bid to evolve with the needs of crypto investors and the supported blockchains, Chorus One has inked several strategic partnerships in the recent past, including MEV Zone. In the recent past, MEV Zone has specialized in addressing the Maximal Extractable Value (MEV) challenges on the Avalanche network. The MEV Zone will help Chorus One’s AVAX node validator to use Proposer-Builder Separation (PBS). As such, Chorus One’s AVAX node will seamlessly select certain transactions that are more profitable when making blocks. For instance, MEV Zone will help Chorus One’s AVAX node validator to capture arbitrage and liquidation transactions more often since they are more profitable.  How will Chorus One’s AVAX Stakers Benefit Via This Partnership? The Chorus One AVAX node has grown over the years to more than 1.77 million coins staked, valued…
Condividi
BitcoinEthereumNews2025/09/18 03:19

Trading GOLD per 1,000,000 USDT

Trading GOLD per 1,000,000 USDTTrading GOLD per 1,000,000 USDT

0 commissioni, leva fino 1,000x, liquidità profonda