<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          Global EditionASIA 中文雙語Fran?ais
          Business

          Experts warn of potential risks from AI

          Organizations urged to focus more on data protection and security controls

          By HE WEI in Shanghai | CHINA DAILY | Updated: 2019-11-29 00:00
          Share
          Share - WeChat

          You turn on your Taobao app and a list of shopping items comes up.

          A lipstick of your preferred color. A dress that matches your newly-purchased top. The next book to read based on your browsing history.

          While people enjoy the perks of smart recommendations powered by artificial intelligence, those mind-reading algorithms, if not properly handled, could be manipulated with malware and create new cybersecurity threats.

          Diana Kelley, the cybersecurity field chief technology officer at Microsoft Corp, said hackers will increasingly use AI to make malware more destructive. This will emerge as among the top five trends for the global cybersecurity landscape in 2020.

          "The rise of AI capabilities provides new opportunities for attackers to create malware that hides from detection while hunting down targets," she said. "It's already in use but often goes un-detected."

          According to the 2019 Poneman Institute report, the global average cost of a data breach is $3.92 million. Unfortunately, it normally takes organizations an average of 206 days to identify a data breach, and another 73 days to contain it.

          Technology advancement has always been a double-edged sword. AI and cloud computing are revolutionizing the customer experience but they pose new threats to cybersecurity.

          Around 55 percent of millennial consumers aged 23 to 38 surveyed by consultancy IDC said they like some websites and mobile apps to be personalized to fit their interests.

          As a result, 40 percent of the data collected by companies throughout the customer journey will be used to create a better product and a bespoke experience.

          As the internet of things and cloud greatly expand the number of devices and the amount of data they gather, the area of attack by hackers widens just as sharply as well.

          "It gives us more signals we could also take in and consume for security purposes too," Kelley said. "And because of the cloud, we can see attacks around the globe, and respond around the globe very quickly."

          She said an overarching approach for companies creating customization while protecting customer privacy is to collect only what is needed and be transparent.

          "Companies should be clear and transparent with your customers about what you are collecting, how you are using and protecting that data, and ensure that you got consent from them so they have the knowledge that their data are being collected," she explained.

          Cathy Huang, associate research director of Services and Security at IDC, agreed. She said: "If your company doesn't have a strong policy, that's going to be a potential problem."

          Organizations must build a program that incorporates defense in depth and implements fundamental security controls, Kelley said.

          "We must consider how operations will continue after a catastrophic cyberattack and build systems that can both withstand the attack and be instantaneously resilient," she stated.

          Microsoft invests over $1 billion annually on cybersecurity research and development. Kelley called for nurturing cybersecurity talents to include people in different trades like law and communications.

          Today's Top News

          Editor's picks

          Most Viewed

          Top
          BACK TO THE TOP
          English
          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 中文字幕国产在线精品| 久久亚洲精精品中文字幕| 在线免费播放av观看| 国产亚洲精品成人aa片新蒲金| 亚洲欧美色中文字幕| caoporn成人免费公开| 国产美女久久久亚洲综合 | 强伦姧人妻免费无码电影| 国产三级精品三级在线区| 欧美日韩精品一区二区三区高清视频| 麻豆精品丝袜人妻久久| 国产精品一区二区三区黄色| 免费看婬乱a欧美大片| 在线无码午夜福利高潮视频| 日韩最新中文字幕| 一级毛片免费观看不卡视频| 国产成人av电影在线观看第一页 | 精品无码国产自产拍在线观看| 色婷婷国产精品视频| 一 级做人爱全视频在线看| 午夜精品一区二区三区成人| 日本中文字幕亚洲乱码| 手机成人午夜在线视频| 51福利国产在线观看午夜天堂| 成人亚洲欧美一区二区三区| 中文字幕在线视频不卡| 婷婷五月亚洲综合图区| 韩国精品久久久久久无码| 亚洲综合av一区二区三区| 人妻少妇无码精品专区| 2020aa一级毛片免费高清| 免费国产一区二区不卡| 亚洲AV无码国产精品夜色午夜| 高清国产亚洲精品自在久久| 无码中文字幕加勒比高清| 你懂的在线视频一区二区| 永久免费无码av在线网站| 欧美性猛交xxxx免费看| 日韩欧美精品suv| 2020精品自拍视频曝光| 成人影片麻豆国产影片免费观看|