Technology

The new paradigm: a concentration of data in AI demands greater vigilance

2025-12-02 15:09
673 views
The new paradigm: a concentration of data in AI demands greater vigilance

In the age of AI, the most dangerous gap for enterprises lies with data in use — the moment it is loaded into memory for processing.

  1. Pro
The new paradigm: a concentration of data in AI demands greater vigilance Opinion By Luigi Caramico published 2 December 2025

Protecting data is at the heart and mind of every enterprise CISO

Comments (0) ()

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing Cyber Security 3d Illustration (Image credit: Shutterstock)

The 1980s were a far cry from what life looks like today. If you weren’t around, you probably don’t remember using paper maps to navigate, renting VHS movies at Blockbuster, printing photos from film, or calling people to talk on their landline phones.

You may also not know that cybersecurity was a thing back then – but even that looked much different than it does today. The early hackers (yes, I was one of them) were motivated by curiosity and the thrill of testing system boundaries. Worries about large-scale cybercrime or widespread threats were largely absent.

Luigi CaramicoSocial Links Navigation

Founder & CTO of DataKrypto.

Today, the stakes are dramatically higher. Data has become the crown jewel of every organization and a high-value target of the most ambitious cybercriminals. As such, protecting data is at the heart and mind of every enterprise CISO, and the number one priority of every security team.

You may like
  • A cybersecurity icon projecting from a laptop screen. Zero Trust: a proven solution for the new AI security challenge
  • AI writer An "AI Exposure Gap" could be the most worrying security issue your business isn't aware of
  • Malware attack virus alert , malicious software infection , cyber security awareness training to protect business The war on trust: how AI is rewriting the rules of cyber resilience

Charged with monitoring, defending, and responding to threats, these teams today face unprecedented challenges as the rapid adoption of artificial intelligence (AI) expands the digital attack surface at an accelerated rate.

From siloes to consolidation: AI and the new concentration of data

In the past, enterprise data was spread across multiple systems and silos. While this created operational inefficiencies, it also provided a natural layer of defense, as attackers had to work harder to locate, access, and extract valuable datasets, much like the logistical challenge of moving tons of gold from Fort Knox.

AI has upended this model. Training and inference require large volumes of data to be consolidated and distilled into compact, portable models. Instead of stitching together fragments from dispersed systems, attackers now face concentrated repositories of sensitive information that are far easier to target and penetrate.

With little built-in security, AI leaves data exposed “in the clear,” making the defender’s job less like guarding Fort Knox and more like protecting a pouch of diamonds – smaller, denser, and far easier to steal.

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

This scenario illustrates why companies using AI face a significantly greater risk of data breaches, leading to financial and reputational harm and compliance failures.

In fact, research suggests that more than three-quarters of businesses have already experienced AI-related breaches, ranging from accidental data leakage to deliberate poisoning of training datasets, which jeopardize their compliance efforts with regulatory frameworks like the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the California Consumer Privacy Act (CCPA).

Without proper safeguards, the risks of using AI are clear, and may be contributing to problems identified in the recent MIT report stating that enterprises are not getting full value from their AI investments.

You may like
  • A cybersecurity icon projecting from a laptop screen. Zero Trust: a proven solution for the new AI security challenge
  • AI writer An "AI Exposure Gap" could be the most worrying security issue your business isn't aware of
  • Malware attack virus alert , malicious software infection , cyber security awareness training to protect business The war on trust: how AI is rewriting the rules of cyber resilience

When the stakes are so high, companies are limiting their use of AI, which also limits their ability to create innovative solutions to highly complex challenges.

When it comes to AI, traditional data security methods are no longer enough.

A new approach: Continuous encryption

Conventional encryption focuses on protecting data at rest (when stored) and in transit (when moved across networks). But in the age of AI, the most dangerous gap lies with data in use — the moment it is loaded into memory for processing, when it must be decrypted or made “in clear.”

This is where continuous encryption becomes indispensable. By maintaining encryption across the entire lifecycle, from storage and transmission through active computation, sensitive information remains shielded at all times. Even during training or inference, data is never decrypted or made vulnerable to unauthorized access.

Two crucial technologies make this possible:

  • Fully Homomorphic Encryption (FHE): Allows computations directly on encrypted data, ensuring that raw values never need to be decrypted.
  • Confidential Computing with Trusted Execution Environments (TEEs): Provides secure enclaves where temporary operations occur in isolated, protected memory, inaccessible even to system administrators or cloud providers.

Combined, these technologies create a “zero-knowledge” environment in which neither the AI provider nor malicious actors can reconstruct inputs, outputs, or models outside the secure enclave. As a result, both customized open-source and proprietary AI LLMs are fully protected, while ensuring the privacy and security of sensitive data.

This zero-knowledge AI environment prevents a range of significant data exposure risks, including the unintentional leakage of sensitive information by employees using both sanctioned and unsanctioned generative AI tools.

A new mandate: End-to-end protection across use cases

For security teams, continuous encryption offers a practical way to safeguard both sensitive data and the models trained on it. This approach presents a new mandate: protection must extend beyond storage and transmission to encompass every stage of data use in the AI lifecycle. The benefits across industries and use cases are powerful:

  • Healthcare: Patient records can be analyzed for predictive insights without risking exposure of personal health information.
  • Financial services: Fraud detection and risk assessment models can run on encrypted customer data without jeopardizing privacy or compliance.
  • Public sector and critical infrastructure: Agencies can share intelligence securely, knowing that sensitive information stays protected throughout the analytics process
  • Retail & consumer services: Retailers can leverage AI to personalize shopping experiences and loyalty programs while protecting customer purchase histories and personal data.
  • Telecommunications & cloud: Providers can optimize networks and deliver secure multi-tenant AI services without risking customer data exposure.

In each case, encryption ensures that sensitive data remains inaccessible to unauthorized parties, even if models are stolen or environments are compromised.

Aligning security with innovation

The rise of AI doesn’t have to come at the expense of security or compliance. Continuous encryption allows organizations to harness the power of AI while maintaining confidentiality, integrity, and regulatory alignment.

This method of end-to-end data protection means organizations can close the most critical security gap in AI, giving them the confidence to innovate without fear of exposure.

We've featured the best endpoint protection software.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

TOPICS AI Luigi CaramicoSocial Links Navigation

Luigi Caramico is Founder & CTO of DataKrypto.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more A cybersecurity icon projecting from a laptop screen. Zero Trust: a proven solution for the new AI security challenge    AI writer An "AI Exposure Gap" could be the most worrying security issue your business isn't aware of    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business The war on trust: how AI is rewriting the rules of cyber resilience    A digital padlock on a blue digital background. Agentic AI introduces new security challenges in era of MCP and A2A    Representational image depecting cybersecurity protection Cybersecurity: the unseen engine of the UK’s digital future    VPN Tunnel Masked, not erased: how broken redaction fuels AI data leaks    Latest in Pro IONOS You can build a website for just $1 with IONOS right now - but this deal won’t be around for long    pcloud cyber monday This pCloud bundle has everything you need to secure your storage for life - and it's on sale just for Cyber Monday    Representational image of a cybercriminal Glassworm returns once again with a third round of VS code attacks    An Android phone being held in the hand 107 Android flaws just got patched by Google - here's how to make sure you're up to date    HTTPS in a browser address bar 4.3 million have installed this malicious browser extension on Chrome and Edge - here's how to check    Secure technology. Polygonal wireframe shield with check mark sign on dark blue. Secure service, protect data, cyber shield, antivirus solution, internet safety, firewall system, privacy Swiss government urges people to ditch Microsoft 365 and others due to lack of proper encryption    Latest in Opinion Sam Altman on a chair Sam Altman calls a ‘code red’ for ChatGPT – here’s what it means    Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing Cyber Security 3d Illustration The new paradigm: a concentration of data in AI demands greater vigilance    Half man, half AI. Why the most impactful AI strategies still start and end with people    A digital padlock on a blue digital background. Rebuilding trust in cyber insurance: closing the gap between assumption and evidence    man sleeping underneath his laptop Windows 10 adoption is stalling, so Microsoft must fix a major issue    Commodore 64 Ultimate The Commodore 64 is back on the production line for the first time in 30 years – and I want it, even if it makes zero sense    LATEST ARTICLES