Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Australian Government weighs EV road user charge this year amid fuel excise criticism

    March 25, 2026

    Securing AI systems under today’s and tomorrow’s conditions

    March 25, 2026

    Top 46 AI Tools in 2026 You Must Use

    March 25, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»AI Tools»Securing AI systems under today’s and tomorrow’s conditions
    Securing AI systems under today’s and tomorrow’s conditions
    AI Tools

    Securing AI systems under today’s and tomorrow’s conditions

    gvfx00@gmail.comBy gvfx00@gmail.comMarch 25, 2026No Comments4 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Evidence cited in an eBook titled “AI Quantum Resilience”, published by Utimaco [email wall], shows organisations consider security risks as the leading barrier to effective adoption of AI on data they hold.

    AI’s value depends on data amassed by an organisation. However, there are security risks to building models and training them on that data. These risks are in addition to better-publicised threats to intellectual property that exist around the point of inference (prompt engineering, for example).

    The eBook’s authors state that organisations need to manage threats throughout their AI development and implementation processes. At the same time, companies can and should prepare to change their security protocols, changes that will become mandatory if quantum computing-powered decryption tools become easily available to bad actors.

    Utimaco lists three areas under threat:

    • Training data can be manipulated by bad actors, degrading model outputs in ways are hard to detect,
    • Models can be extracted or copied, eroding intellectual property rights,
    • Sensitive data used during training or inference can be exposed.

    Current public key cryptography will become vulnerable in the next ten years, the report’s authors attest; a period in which capable quantum systems may emerge. Regardless of the timescale, it’s thought that better organised groups currently collect encrypted data and store it to decrypt when or if quantum facilities become available. Any dataset with long-term sensitivity, including model training data, financial records, or intellectual property, may require protection against future decryption, therefore, Utimaco says.

    A migration to quantum-resistant cryptography will affect protocols, key management, system interoperability, and performance, so any migration is likely to take several years. The report’s authors suggest what they term ‘crypto-agility’, which it defines as changing cryptographic algorithms without redesigning underlying systems. ‘Crypto-agility’ is based on the principle of hybrid cryptography – combining established algorithms with post-quantum methods, such as those suggested by NIST.

    The eBook’s authors concur that cryptography on its own doesn’t address all possible areas of risk. It advocates the use of hardware-based trust devices that can isolate cryptographic keys and sensitive operations from normal working environments.

    If companies are developing their own AI tools and processes, protection on that basis should extend throughout the AI lifecycle, from data ingestion through to training, model deployment, and inference in production. Hardware keys used to encrypt data and sign models can be generated and stored inside a boundary. Model integrity can then be verified before deployment, and sensitive data processed during inference remains protected.

    Hardware-based enclaves isolate workloads so that even system administrators with sufficient privileges can’t access any of the data being processed. Hardware modules can verify that the data enclave is in a trusted state before releasing keys – a process of external attestation – helping create a ‘chain of trust’ from hardware to application.

    Hardware-based key management produces tamper-resistant logs covering access and operations to support compliance frameworks such as the EU AI Act.

    Many of the risks inherent in AI systems are well known if not already exploited. The risk from quantum computing’s ability to decrypt data currently considered safe is less immediate, but the implications should affect data and infrastructure decisions made today, Utimaco states. It advocates:

    • A strengthening of controls throughout the AI development and deployment lifecycle,
    • The introduction of ‘crypto-agility’ to allow transition to post-quantum security,
    • Establishing hardware-based trust mechanisms wherever high-value assets are in play.

    (Image source: “Scanning electron micrograph of an apoptotic HeLa cell” by National Institutes of Health (NIH) is licensed under CC BY-NC 2.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc/2.0)

     

    Want to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is part of TechEx and co-located with other leading technology events. Click here for more information.

    AI News is powered by TechForge Media. Explore other upcoming enterprise technology events and webinars here.

    Table of Contents

    Toggle
      • Related posts:
    • US intel chief Gabbard says Iran was not rebuilding enrichment prior to war | US-Israel war on Iran ...
    • David Szalay wins Booker Prize for his novel Flesh | Arts and Culture News
    • US envoy suggests it would be ‘fine’ if Israel expands across Middle East | Israel-Palestine conflic...

    Related posts:

    Trump lavishes praise on UK troops amid anger over his Afghanistan claims | Taliban News

    Alibaba Qwen is challenging proprietary AI model economics

    Gaza’s ‘phase two’ from a distance: Why hope still feels out of reach | Israel-Palestine conflict Ne...

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTop 46 AI Tools in 2026 You Must Use
    Next Article Australian Government weighs EV road user charge this year amid fuel excise criticism
    gvfx00@gmail.com
    • Website

    Related Posts

    AI Tools

    Philippine president declares energy emergency as impact of Iran war felt | US-Israel war on Iran News

    March 25, 2026
    AI Tools

    Automating complex finance workflows with multimodal AI

    March 24, 2026
    AI Tools

    Why has India arrested US, Ukrainian nationals under anti-terror laws? | Russia-Ukraine war News

    March 24, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 202541 Views

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 202541 Views

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.