• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Thoroughly Modern: Proceed With Caution With AI In The Landscape Of Cybersecurity

    April 8, 2024 Pauline Brazil Ayala

    In the fast-evolving realm of technological innovation, AI has emerged as one of the most compelling yet controversial advancements. Its potential spans industries, revolutionizing not only how data is processed but also how ideas are conceived.

    A recent study by PEW Research indicates that almost a quarter of employed Americans aged 30 to 49 have used ChatGPT for work, up from 8 percent last year. Its allure lies in automation; augmenting tasks like writing contracts and analyzing data with speed and efficiency that far surpass human limitations.

    However, with innovation comes the need for vigilance – particularly in the realm of information security. The surge in generative AI adoption has drawn much attention to understanding its implications – especially in cybersecurity and the legalities surrounding copyright, data privacy, and intellectual property rights.

    The Security Implications of AI

    We know that AI tools can revolutionize efficiency, but without proper controls in place there is also the potential of opening the door to security breaches and data privacy issues. Organizations must pay special attention to train their people on what data is considered private or proprietary and the criticality of ensuring that information is not used as input into public AI engines. Such exposure of sensitive information could result in unprecedented vulnerabilities, directly impacting a company’s resilience against cyber-attacks.

    I recommend a balanced approach when companies are considering how they might integrate AI into their users’ arsenal of tools. The truth is that people are already engaging powerful AI engines on their smart phones, so education on how improper usage can affect the company from a security and privacy standpoint is paramount. Policies must be drawn up, detailing the ins and outs of what constitutes safe interaction with AI systems.

    The inherent risks of inputting private data into public AI engines cannot be overstated. A key concern is preventing leakage of sensitive data into AI models that are publicly accessible, thereby inadvertently handing crucial information to potential adversaries. Companies must be particularly discerning about the information they input into public AI engines to avoid compromising sensitive data – personal customer information, company financial details, and precious trade secrets.

    When it comes to copyright, intellectual property (IP), and data privacy, the waters are even murkier. The question of who maintains the rights to generated content remains hotly debated and without clear legal consensus. If you use generative AI to write a software application for your company, who owns that IP? Can you copyright it? Are you infringing on someone else’s copyright or IP? Has it exposed data that should be held private? Industries have speculated, lawyers have deliberated, but no clear consensus has emerged. Consequently, any utilization of generative AI in processes such as software development demands thorough scrutiny to ensure proprietary information remains protected.

    With the urge to integrate AI into the fabric of business operations rising, I urge companies to think twice before employing AI for their development processes. Every line of code fed into a system you do not own may risk divulging trade secrets, and as it stands, legal experts have yet to determine unequivocally who retains rights to the generated material.

    Securing Your IBM i

    While IBM i is known for its strong security, there are still vulnerabilities that need to be addressed and older practices that must be updated. The rise of generative AI is likely to make exploitation easier for those seeking to leverage vulnerabilities. The convenience of crafting hacks is poised to increase significantly, putting sensitive systems at greater risk. New technologies, particularly in their early stages, are often vulnerable to misuse.

    Now more than ever, ensuring a strong security posture on your systems is crucial. Implementing a robust security solution, such as Fresche’s IBM i security suite, to fortify your IBM i systems’ defenses and ensure data security is paramount. I recommend a zero-trust, multi-layered approach that involves assessing and securing each component of your environment – this will increase protection for your organization against internal and external security threats.

    Employing fundamental security strategies like separation of duties and the principle of least privilege is also key. These measures are critical in controlling who has access to what data and, consequently, what can be fed into an AI engine. By preventing unauthorized access to restricted data, the risk associated with what can be done with it is significantly reduced.

    Towards A Responsible Future

    AI stands at the forefront of a technological revolution, its impact just beginning to ripple through the fabric of information security. The landscape of AI is ever-changing, making it crucial to stay informed as its integration touches every industry.

    For IBM i professionals, navigating this new territory demands a careful approach – building on the strong security foundations that define the platform, while considering the innovative potential AI introduces. Striking this balance is crucial as we venture into an AI-driven future, aware of its potential yet ready for the challenges it may bring. This means exploring how AI can enhance current processes without undermining the secure base of the platform. A critical approach, strategic planning, and unwavering dedication to protecting key assets are vital to ensure that as we advance into the future, our most sensitive information remains secure.

    As we bridge the gap between technology and application, I encourage stakeholders to proceed with caution, ensuring that the infrastructure and policies we establish are stringent enough to meet the demands of AI. Our aim is to ensure that as technology evolves, security standards do not diminish. Upholding strong security measures and sensible policies is paramount in protecting the integrity of IBM i systems and data.

    Pauline Brazil Ayala is Senior Security Advisor at Fresche Solutions. Pauline is an IBM i security expert with over 25 years of experience in developing enterprise-level security software. Her involvement has spanned the entire spectrum of software production, from initial requirements gathering to final delivery, including sales and ensuring ongoing customer satisfaction.

    This content is sponsored by Fresche Solutions.

    RELATED STORIES

    Thoroughly Modern: A Practical Primer For The IBM i Cloud Journey

    Thoroughly Modern: From Tradition To Transformation For IBM i In The Era Of Cloud And AI

    Thoroughly Modern: How IBM i Shops Can Navigate The AI Landscape In 2024

    Thoroughly Modern: Practical Ways IBM i Developers Can Use AI Today

    Thoroughly Modern: How X-Analysis Transforms IBM i Challenges Into Solutions

    Thoroughly Modern: What’s New In IBM i IT Planning

    Thoroughly Modern: Top Things To Stop IBM i Hacks

    Thoroughly Modern: The Mid-Year Check – Accelerating IT Projects and Modernization for the Second Half of the Year

    Thoroughly Modern: Remote Managed Services Fill In For Retiring And Overburdened IT Staff

    Thoroughly Modern: Proven Strategies For Innovating IT And IBM i In A Digital Age

    Thoroughly Modern: Unlocking the Full Potential Of Your IBM i Applications

    Thoroughly Modern: Why Modernizing IBM i Applications Is Important And Where to Start

    Thoroughly Modern: What You Need to Know About IBM i Security

    Thoroughly Modern: Flexible And Fractional Staffing Models That Deliver

    Thoroughly Modern: How To Optimize IT In 2023

    Thoroughly Modern: A Swiss Army Knife For IBM i Developers

    Thoroughly Modern: Digital Solutions For IBM i And Beyond

    Thoroughly Modern: Simplify IBM i Application Management and Extract Key Insights

    Thoroughly Modern: Four Ways Staff Augmentation Is Helping IT Get Things Done

    Thoroughly Modern: Bring Security, Speed, And Consistency To IT With Automation

    Thoroughly Modern: Good Security Is Just As Important As Good Code

    Thoroughly Modern: The Real Top 5 Challenges For IBM i Shops Today

    Thoroughly Modern: Improving The Digital Experience With APIs

    Thoroughly Modern: IBM i Security Is No Longer Set It And Forget It

    Thoroughly Modern: Taking Charge of Your Hardware Refresh in 2022

    Thoroughly Modern: Building Organizational Resilience in the Digital Age

    Thoroughly Modern: Time To Develop Your IBM i HA/DR Plan For 2022

    Thoroughly Modern: Infrastructure Challenges And Easing Into The Cloud

    Thoroughly Modern: Talking IBM i System Management With Abacus

    Thoroughly Modern: Making The Case For Code And Database Transformation

    Thoroughly Modern: Making Quick Wins Part Of Your Modernization Strategy

    Thoroughly Modern: Augmenting Your Programming Today, Solving Staffing Issues Tomorrow

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: AI, Fresche Solutions, IBM i, Thoroughly Modern

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Watch this webinar where we showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch the replay now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    IBM Hardware, Software, And Support Prices Hiked Details On The IBM i Subscription Conversion Deals For P05 And P10 Tiers

    Leave a Reply Cancel reply

TFH Volume: 34 Issue: 18

This Issue Sponsored By

  • Maxava
  • Fresche Solutions
  • Computer Keyes
  • Manta Technologies
  • Raz-Lee Security

Table of Contents

  • Details On The IBM i Subscription Conversion Deals For P05 And P10 Tiers
  • Thoroughly Modern: Proceed With Caution With AI In The Landscape Of Cybersecurity
  • IBM Hardware, Software, And Support Prices Hiked
  • Precisely Streams IBM i Data Into Amazon’s New Db2 Service
  • IBM i PTF Guide, Volume 26, Number 13

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle