Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Will It Build A Smaller 4×4?

    May 9, 2026

    Australia’s populist One Nation scores first-ever lower house victory | Elections News

    May 9, 2026

    Understanding AI Agent Memory Patterns: A Guide with LangGraph

    May 9, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»AI Tools»Securing AI systems under today’s and tomorrow’s conditions
    Securing AI systems under today’s and tomorrow’s conditions
    AI Tools

    Securing AI systems under today’s and tomorrow’s conditions

    gvfx00@gmail.comBy gvfx00@gmail.comMarch 25, 2026No Comments4 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Evidence cited in an eBook titled “AI Quantum Resilience”, published by Utimaco [email wall], shows organisations consider security risks as the leading barrier to effective adoption of AI on data they hold.

    AI’s value depends on data amassed by an organisation. However, there are security risks to building models and training them on that data. These risks are in addition to better-publicised threats to intellectual property that exist around the point of inference (prompt engineering, for example).

    The eBook’s authors state that organisations need to manage threats throughout their AI development and implementation processes. At the same time, companies can and should prepare to change their security protocols, changes that will become mandatory if quantum computing-powered decryption tools become easily available to bad actors.

    Utimaco lists three areas under threat:

    • Training data can be manipulated by bad actors, degrading model outputs in ways are hard to detect,
    • Models can be extracted or copied, eroding intellectual property rights,
    • Sensitive data used during training or inference can be exposed.

    Current public key cryptography will become vulnerable in the next ten years, the report’s authors attest; a period in which capable quantum systems may emerge. Regardless of the timescale, it’s thought that better organised groups currently collect encrypted data and store it to decrypt when or if quantum facilities become available. Any dataset with long-term sensitivity, including model training data, financial records, or intellectual property, may require protection against future decryption, therefore, Utimaco says.

    A migration to quantum-resistant cryptography will affect protocols, key management, system interoperability, and performance, so any migration is likely to take several years. The report’s authors suggest what they term ‘crypto-agility’, which it defines as changing cryptographic algorithms without redesigning underlying systems. ‘Crypto-agility’ is based on the principle of hybrid cryptography – combining established algorithms with post-quantum methods, such as those suggested by NIST.

    The eBook’s authors concur that cryptography on its own doesn’t address all possible areas of risk. It advocates the use of hardware-based trust devices that can isolate cryptographic keys and sensitive operations from normal working environments.

    If companies are developing their own AI tools and processes, protection on that basis should extend throughout the AI lifecycle, from data ingestion through to training, model deployment, and inference in production. Hardware keys used to encrypt data and sign models can be generated and stored inside a boundary. Model integrity can then be verified before deployment, and sensitive data processed during inference remains protected.

    Hardware-based enclaves isolate workloads so that even system administrators with sufficient privileges can’t access any of the data being processed. Hardware modules can verify that the data enclave is in a trusted state before releasing keys – a process of external attestation – helping create a ‘chain of trust’ from hardware to application.

    Hardware-based key management produces tamper-resistant logs covering access and operations to support compliance frameworks such as the EU AI Act.

    Many of the risks inherent in AI systems are well known if not already exploited. The risk from quantum computing’s ability to decrypt data currently considered safe is less immediate, but the implications should affect data and infrastructure decisions made today, Utimaco states. It advocates:

    • A strengthening of controls throughout the AI development and deployment lifecycle,
    • The introduction of ‘crypto-agility’ to allow transition to post-quantum security,
    • Establishing hardware-based trust mechanisms wherever high-value assets are in play.

    (Image source: “Scanning electron micrograph of an apoptotic HeLa cell” by National Institutes of Health (NIH) is licensed under CC BY-NC 2.0. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc/2.0)

     

    Want to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is part of TechEx and co-located with other leading technology events. Click here for more information.

    AI News is powered by TechForge Media. Explore other upcoming enterprise technology events and webinars here.

    Table of Contents

    Toggle
      • Related posts:
    • ‘Bangladesh will be better’: BNP victory puts nation at crossroads | Elections
    • Brazil’s Chamber of Deputies passes bill to lower Bolsonaro’s sentence | Jair Bolsonaro News
    • US-brokered Russia-Ukraine talks close with no breakthrough | Russia-Ukraine war News

    Related posts:

    Russia-Ukraine war: List of key events, day 1,335 | Russia-Ukraine war News

    Wall Street’s AI gains are here — banks plan for fewer people

    Tesla-Intel chip partnership: 10% of Nvidia's cost

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleTop 46 AI Tools in 2026 You Must Use
    Next Article Australian Government weighs EV road user charge this year amid fuel excise criticism
    gvfx00@gmail.com
    • Website

    Related Posts

    AI Tools

    Australia’s populist One Nation scores first-ever lower house victory | Elections News

    May 9, 2026
    AI Tools

    Wembanyama powers Spurs past T-Wolves as Knicks beat Sixers in NBA playoffs | Basketball News

    May 9, 2026
    AI Tools

    Laura Fernandez sworn in as Costa Rica’s new president | Elections News

    May 9, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025144 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202576 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202574 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025144 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202576 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202574 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.