<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
          Global EditionASIA 中文雙語Fran?ais
          Business

          Experts warn of potential risks from AI

          Organizations urged to focus more on data protection and security controls

          By HE WEI in Shanghai | CHINA DAILY | Updated: 2019-11-29 00:00
          Share
          Share - WeChat

          You turn on your Taobao app and a list of shopping items comes up.

          A lipstick of your preferred color. A dress that matches your newly-purchased top. The next book to read based on your browsing history.

          While people enjoy the perks of smart recommendations powered by artificial intelligence, those mind-reading algorithms, if not properly handled, could be manipulated with malware and create new cybersecurity threats.

          Diana Kelley, the cybersecurity field chief technology officer at Microsoft Corp, said hackers will increasingly use AI to make malware more destructive. This will emerge as among the top five trends for the global cybersecurity landscape in 2020.

          "The rise of AI capabilities provides new opportunities for attackers to create malware that hides from detection while hunting down targets," she said. "It's already in use but often goes un-detected."

          According to the 2019 Poneman Institute report, the global average cost of a data breach is $3.92 million. Unfortunately, it normally takes organizations an average of 206 days to identify a data breach, and another 73 days to contain it.

          Technology advancement has always been a double-edged sword. AI and cloud computing are revolutionizing the customer experience but they pose new threats to cybersecurity.

          Around 55 percent of millennial consumers aged 23 to 38 surveyed by consultancy IDC said they like some websites and mobile apps to be personalized to fit their interests.

          As a result, 40 percent of the data collected by companies throughout the customer journey will be used to create a better product and a bespoke experience.

          As the internet of things and cloud greatly expand the number of devices and the amount of data they gather, the area of attack by hackers widens just as sharply as well.

          "It gives us more signals we could also take in and consume for security purposes too," Kelley said. "And because of the cloud, we can see attacks around the globe, and respond around the globe very quickly."

          She said an overarching approach for companies creating customization while protecting customer privacy is to collect only what is needed and be transparent.

          "Companies should be clear and transparent with your customers about what you are collecting, how you are using and protecting that data, and ensure that you got consent from them so they have the knowledge that their data are being collected," she explained.

          Cathy Huang, associate research director of Services and Security at IDC, agreed. She said: "If your company doesn't have a strong policy, that's going to be a potential problem."

          Organizations must build a program that incorporates defense in depth and implements fundamental security controls, Kelley said.

          "We must consider how operations will continue after a catastrophic cyberattack and build systems that can both withstand the attack and be instantaneously resilient," she stated.

          Microsoft invests over $1 billion annually on cybersecurity research and development. Kelley called for nurturing cybersecurity talents to include people in different trades like law and communications.

          Today's Top News

          Editor's picks

          Most Viewed

          Top
          BACK TO THE TOP
          English
          Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
          License for publishing multimedia online 0108263

          Registration Number: 130349
          FOLLOW US
          主站蜘蛛池模板: 脱了老师内裤猛烈进入| 国产成人精品18| 免费无码av片在线观看网址 | 亚洲精品无码成人A片九色播放| 人人爽人人模人人人爽人人爱| 国产性三级高清在线观看| 亚洲男人第一无码av网| 亚洲日本精品国产第一区| 自拍日韩亚洲一区在线| 亚洲国产成人av在线观看| 熟妇啊轻点灬大JI巴太粗| 亚洲人成网站在线播放无码| 中文字幕亚洲制服在线看 | 日韩卡一卡2卡3卡4卡| 日本黄色一区二区三区四区| 日韩有码精品中文字幕| 色综合亚洲一区二区小说| 国产伦一区二区三区精品| 男人扒女人添高潮视频| 野外做受又硬又粗又大视频| 国产精品熟女乱色一区二区| 给我播放片在线观看| 日韩精品一区二区在线视| 在线日韩一区二区| 国产精品亚洲综合久久小说| 久久久欧美国产精品人妻噜噜| 国产婷婷在线精品综合| 国产又黄又爽又刺激的免费网址 | 潮喷失禁大喷水av无码| 免费福利视频一区二区三区高清| 大陆一级毛片免费播放| 蜜芽亚洲AV无码精品国产午夜| 性少妇videosexfreexxxx片| 丰满的少妇被猛烈进入白浆 | 日韩区中文字幕在线观看| 国产桃色在线成免费视频| 欧美xxxxhd高清| 亚洲国产成人无码网站大全| а∨天堂一区中文字幕 | 亚洲av成人一区二区三区色| 欧洲精品色在线观看|