{"id":877730,"date":"2025-12-16T22:15:19","date_gmt":"2025-12-17T04:15:19","guid":{"rendered":"https:\/\/newsycanuse.com\/index.php\/2025\/12\/16\/delivering-securely-on-data-and-ai-strategy\/"},"modified":"2025-12-16T22:15:19","modified_gmt":"2025-12-17T04:15:19","slug":"delivering-securely-on-data-and-ai-strategy","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2025\/12\/16\/delivering-securely-on-data-and-ai-strategy\/","title":{"rendered":"Delivering securely on data and AI strategy\u00a0"},"content":{"rendered":"<div id=\"content--body\">\n<div>\n<p>Most organizations feel the imperative to keep pace with continuing advances in AI capabilities, as highlighted in a recent <a href=\"https:\/\/www.technologyreview.com\/2025\/10\/29\/1124014\/building-a-high-performance-data-and-ai-organization-2nd-edition\/\" target=\"_blank\">MIT Technology Review Insights report<\/a>. That clearly has security implications, particularly as organizations navigate a surge in the volume, velocity, and variety of security data. This explosion of data, coupled with fragmented toolchains, is making it increasingly difficult for security and data teams to maintain a proactive and unified security posture.\u00a0<\/p>\n<p>Data and AI teams must move rapidly to deliver the desired business results, but they must do so without compromising security and governance. As they deploy more intelligent and powerful AI capabilities, proactive threat detection and response against the expanded attack surface, insider threats, and supply chain vulnerabilities must remain paramount. \u201cI\u2019m passionate about cybersecurity not slowing us down,\u201d says Melody Hildebrandt, chief technology officer at Fox Corporation, \u201cbut I also own cybersecurity strategy. So I\u2019m also passionate about us not introducing security vulnerabilities.\u201d\u00a0<\/p>\n<\/p><\/div>\n<div>\n<figure><a href=\"https:\/\/www.databricks.com\/resources\/analyst-research\/delivering-securely-data-and-ai-strategy\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" height=\"2000\" width=\"1555\" src=\"https:\/\/wp.technologyreview.com\/wp-content\/uploads\/2025\/11\/MIT_DatabricksEbrief_CoverV4_101525.png?w=1555\" alt><\/a><\/figure>\n<p>That\u2019s getting more challenging, says Nithin Ramachandran, who is global vice president for data and AI at industrial and consumer products manufacturer 3M. \u201cOur experience with generative AI has shown that we need to be looking at security differently than before,\u201d he says. \u201cWith every tool we deploy, we look not just at\u00a0its functionality but also its security posture. The latter is now what we lead with.\u201d\u00a0<\/p>\n<figure><a href=\"https:\/\/www.databricks.com\/resources\/analyst-research\/delivering-securely-data-and-ai-strategy\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/wp.technologyreview.com\/wp-content\/uploads\/2025\/11\/MITTR2025_V4_QuoteDatabricksSocials.png\" alt><\/a><\/figure>\n<p>Our survey of 800 technology executives (including 100 chief information security officers), conducted in June 2025, shows that many organizations struggle to strike this balance.\u00a0<\/p>\n<p><a href=\"https:\/\/www.databricks.com\/resources\/analyst-research\/delivering-securely-data-and-ai-strategy\">Download the report.<\/a><\/p>\n<p><em>This content was produced by Insights, the custom content arm of MIT Technology Review. It was not written by MIT Technology Review\u2019s editorial staff. It was researched, designed, and written by human writers, editors, analysts, and illustrators. AI tools that may have been used were limited to secondary production processes that passed thorough human review.<\/em><\/p>\n<\/p><\/div>\n<\/div>\n<p><a href=\"https:\/\/www.technologyreview.com\/2025\/12\/04\/1128311\/delivering-securely-on-data-and-ai-strategy\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n MIT Technology Review Insights<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most organizations feel the imperative to keep pace with continuing advances in AI capabilities, as highlighted in a recent MIT Technology Review Insights report. That clearly has security implications, particularly as organizations navigate a surge in the volume, velocity, and variety of security data. This explosion of data, coupled with fragmented toolchains, is making it<\/p>\n","protected":false},"author":1,"featured_media":877731,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26884,23813,46],"tags":[],"class_list":{"0":"post-877730","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-delivering","8":"category-securely","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/877730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=877730"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/877730\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/877731"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=877730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=877730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=877730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}