#Big Data Security Management
Explore tagged Tumblr posts
kishorxox · 4 months ago
Text
Big Data Security Market to be Worth $60.1 Billion by 2031
Meticulous Research®—a leading global market research company, published a research report titled, ‘Big Data Security Market by Component (Solutions [Data Encryption, Security Intelligence, Data Backup & Recovery], Services), Deployment Mode, Organization Size, End User (IT & Telecom, BFSI, Retail & E-commerce), and Geography - Global Forecast to 2031.’
According to this latest publication from Meticulous Research®, the big data security market is projected to reach $60.1 billion by 2031, at a CAGR of 13.2% from 2024 to 2031. The growth of the big data security market is driven by the emergence of disruptive digital technologies, the increasing demand for data security and privacy solutions due to the rise in data breaches, and the growing data generation in the e-commerce industry. However, the high implementation costs of big data security solutions restrain the growth of this market.
Furthermore, the growing need for cloud-based security solutions and the increasing integration of AI, ML, and blockchain technologies in security solutions are expected to generate growth opportunities for the stakeholders in this market. However, the lack of knowledge about big data security solutions and the shortage of skilled IT professionals are major challenges impacting the growth of the big data security market.
The big data security market is segmented by component (solutions [data discovery and classification, data encryption {data protection, tokenization, data masking, other data encryption solutions}, security intelligence, data access control & authentication, data governance & compliance, data backup & recovery, data auditing & monitoring, other solutions], services [professional services, managed services]), deployment mode (on-premise deployments, cloud-based deployments), organization size (large enterprises, small & medium-sized enterprises), end user (IT & telecom, healthcare & pharmaceutical, BFSI, retail & e-commerce, energy & utilities, government, manufacturing, media & entertainment, transportation & logistics, and other end users). The study also evaluates industry competitors and analyzes the market at the regional and country levels.
Based on component, the big data security market is segmented into solutions and services. The solutions segment is further segmented into data discovery and classification, data encryption, security intelligence, data access control & authentication, data governance & compliance, data backup & recovery, data auditing & monitoring, and other solutions. In 2024, the solutions segment is expected to account for the larger share of the big data security market. The large market share of this segment is attributed to the increasing concerns regarding data security and privacy, the increasing adoption of data security solutions by SMEs, and the rising demand for encryption solutions for data protection across IoT devices. Big data security solutions include tools and measures to process or safeguard data and analytics processes. In March 2024, CrowdStrike, Inc. (U.S.) partnered with Rubrik, Inc. (U.S.) to transform data security solutions and stop breaches of critical information. Moreover, this segment is also projected to register the highest CAGR during the forecast period.
Based on deployment mode, the big data security market is segmented into on-premise deployments and cloud-based deployments. In 2024, the on-premise deployments segment is expected to account for the larger share of the big data security market. The large market share of this segment is attributed to the higher preference for on-premise deployments among large enterprises and increasing data generation in large enterprises. The on-premise model of deployment is majorly adopted by well-established and large companies that are capable of making capital investments toward the required hardware and hosting environments. In addition, these organizations also have sufficient in-house IT expertise to maintain software efficiency. Internal big data security is one of the major benefits of on-premise deployments.
However, the cloud-based deployments segment is projected to register the higher CAGR during the forecast period. The growth of this segment is driven by the rapid evolution of new security avenues for cloud-based deployments, the superior flexibility offered by cloud-based deployments, and the increase in security breaches. Cloud-based security solutions provide social networking privacy, system optimization, online storage, regulatory compliance, and connected device security. The adoption of cloud computing and storage systems is gaining popularity among small and medium-scale enterprises, supporting the growth of this segment.
Based on organization size, the big data security market is segmented into large enterprises and small & medium-sized enterprises. In 2024, the large enterprises segment is expected to account for the larger share of the big data security market. The large market share of this segment is attributed to the strong IT infrastructure of large enterprises, the growing adoption of advanced technologies such as AI, IoT, and blockchain, and the availability of skilled IT personnel to manage data security platforms. With larger budgets and a keen focus on developing strategic IT initiatives, large enterprises have a competitive advantage over small and medium-scale enterprises in terms of technology adoption. Large enterprises have a stable financial backup and can easily procure customized data security solutions, contributing to this segment's growth.
However, the small & medium-sized enterprises segment is projected to register the higher CAGR during the forecast period. The growth of this segment is driven by increasing digital transformation, government initiatives to promote security solutions, and the rising incidence of data breaches. SMEs are also increasingly becoming targets of cybercrime and therefore adopting suitable and strong security solutions.
Based on end user, the big data security market is segmented into IT & telecom, healthcare & pharmaceutical, BFSI, retail & e-commerce, energy & utilities, government, manufacturing, media & entertainment, transportation & logistics, and other end users. In 2024, the IT & telecom segment is expected to account for the largest share of the big data security market. The large market share of this segment is attributed to the increasing data breaches in IT companies as they store a vast amount of customer data, strict regulatory compliance forcing companies to implement stricter data security measures, and the increasing adoption of cloud-based solutions in the IT industry. In March 2023, IBM Corporation (U.S.) collaborated with Cohesity, Inc. (U.S.) to address increased data security and resiliency issues in hybrid cloud environments. With this collaboration, IBM launched its new IBM Storage Defender solution, including Cohesity's data protection, cyber resilience, and data management capabilities in the offering.
However, the healthcare & pharmaceutical segment is projected to register the highest CAGR during the forecast period. The growth of this segment is driven by the rising adoption of telemedicine devices and remote healthcare services, growing cyberattacks on connected devices, and the increasing demand for secure medical connected devices. A vast amount of medical data is generated in the healthcare sector. It is stored to improve patient outcomes, personalize treatment plans, and develop new drugs, among other applications. However, this sensitive data requires robust security measures to protect patient privacy and prevent unauthorized access. In November 2021, Armis, Inc. (U.S.) partnered with Nuvolo (U.S.) to improve data interoperability and the overall risk posture of healthcare organizations.
Based on geography, the big data security market is segmented into North America, Europe, Asia-Pacific, Latin America, and the Middle East & Africa. In 2024, North America is expected to account for the largest share of the big data security market. The market growth in North America is driven by the presence of prominent players offering advanced big data security solutions & services, the early adoption of disruptive technologies, and growing awareness regarding data security. North America is home to several major players that provide products and services to improve big data security measures for IT assets, data, and privacy across different domains. Thus, big data security companies operating in the North America region are investing heavily in R&D activities to develop new & advanced security solutions that can address rising security challenges. In February 2024, Cyberhaven, Inc. (U.S.) launched Linea AI, an AI platform designed to combat the critical insider risks threatening vital corporate data.
However, the Asia-Pacific region is projected to record the highest CAGR during the forecast period. The growth of this market is driven by the growing data breaches, supportive government initiatives, and growing awareness regarding data security among small and medium-scale organizations. In December 2023, Safetica a.s. (U.S.) partnered with Kaira Global (Singapore) to deliver Safetica's Data Loss Prevention (DLP) solutions for enterprises of all sizes to safeguard their data against insider risks and data breaches in Singapore. APAC is the fastest-growing big data security market due to rapid investments in IT infrastructure, extensive use of the Internet, and growing security challenges.
Key Players
The key players operating in the big data security market are Check Point Software Technologies, Ltd. (Israel), Cisco Systems, Inc. (U.S.), Fortinet, Inc. (U.S.), Oracle Corporation (U.S.), IBM Corporation (U.S.), Microsoft Corporation (U.S.), Hewlett Packard Enterprise Development LP (U.S.), Intel Corporation (U.S.), Palo Alto Networks, Inc. (U.S.), Thales Group (France), Juniper Networks, Inc. (U.S.), Broadcom, Inc. (U.S.), Dell Technologies, Inc. (U.S.), CyberArk Software Ltd. (U.S.), and Rapid7, Inc. (U.S.).
Download Sample Report Here @ https://www.meticulousresearch.com/download-sample-report/cp_id=4984
Key Questions Answered in the Report:
What are the high-growth market segments in terms of the component, deployment mode, organization size, and end user?
What is the historical market size for the global big data security market?
What are the market forecasts and estimates for 2024–2031?
What are the major drivers, restraints, opportunities, challenges, and trends in the global big data security market?
Who are the major players in the global big data security market, and what are their market shares?
What is the competitive landscape like?
What are the recent developments in the global big data security market?
What are the different strategies adopted by major market players?
What are the trends and high-growth countries?
Who are the local emerging players in the global big data security market, and how do they compete with the other players?
Contact Us: Meticulous Research® [email protected] Contact Sales- +1-646-781-8004 Connect with us on LinkedIn- https://www.linkedin.com/company/meticulous-research
0 notes
abathurofficial · 9 days ago
Text
Abathur
Tumblr media
At Abathur, we believe technology should empower, not complicate.
Our mission is to provide seamless, scalable, and secure solutions for businesses of all sizes. With a team of experts specializing in various tech domains, we ensure our clients stay ahead in an ever-evolving digital landscape.
Why Choose Us? Expert-Led Innovation – Our team is built on experience and expertise. Security First Approach – Cybersecurity is embedded in all our solutions. Scalable & Future-Proof – We design solutions that grow with you. Client-Centric Focus – Your success is our priority.
2 notes · View notes
tipsinlifeformarketing · 3 months ago
Text
The Impact of Big Data Analysis on Business
Tumblr media
In the modern era, data has become an essential tool for businesses of all sizes. Big data analysis has transformed how firms approach decision-making, consumer contact, and marketing strategies. However, as the volume and complexity of data has increased, privacy and security concerns have grown. In this blog, we will examine the impact of big data on business, as well as the major issues around data analytics, privacy, and security.
Big data Analysis
Big data analytics involves finding patterns, connections and key points that might guide business decisions or simply the processing and analyzing of massive and complicated data sets. Today’s businesses or organizations might gain valuable factors like consumer behavior, industrial trends and product success, and all of this is possible only because the data is present in abundance. Big data analytics makes it possible to make better decisions, working more efficiently and leading innovations.
Businesses use big data analytics to personalize and customize their marketing strategies which is one of its biggest advantages. Companies can get deeper understandings of the interests, needs and behaviors of their customers by analyzing the customer data. Marketers use this data to create personalized messages and promotions for individual customers to increase communication, engagement and drive the sales.
Privacy
With increase in usage of big data analytics, there is a raise in concerns related to data privacy and security. Companies collect customer information which leads to the risks of data theft or data misuse. Lawmakers have passed privacy regulations like the General Data Protection Regulation(GDPR) of the EU to protect consumer’s personal data.
Privacy refers to a person’s right to keep secrecy and control over their personal information. Concerns over privacy have grown in the digital era as a result of the extensive gathering, storing, and sharing of personal data made possible by technology and internet platforms.
Security
Big data analytics presents security risks in addition to privacy issues. Because businesses have so much valuable data under their control, they are on the targets for hackers. Significant ramifications from data breaches could include monetary losses, damage to one’s reputation, and legal consequences.
Companies need to be proactive in updating their security protocols to stop data leaks. Using multi-factor authentication, encrypting data, and routinely checking for unusual activity are all necessary for this. Enterprises need to have a well-defined strategy in place for responding to data breaches, encompassing notifying individuals affected and implementing measures to mitigate the effect.
Impact of Big Data Analysis
Tumblr media
Big data analytics significantly impacts various sectors and, in healthcare, helps in improving patient recoveries by analyzing trends in patient data and predicting potential health risks. Finance professionals can use big data analytics to detect fraud and identify financial threats.
Furthermore, by giving insights into customer behavior and industry trends, big data analytics may assist firms in making better decisions.
Privacy Challenges
Preserving people’s privacy is one of the biggest problems with big data analytics. To obtain critical insights, businesses must collect enormous amounts of data, yet this data typically includes personally identifying information like names, addresses, and even credit card numbers. or stealing this information can lead to severe consequences for individuals.
To address this issue, firms must collect data in an ethical and responsible manner. They should explicitly ask for consent before gathering user data, be transparent about the information they collect, and implement strong security measures to safeguard it.
Security Challenges
Security threats accompany privacy concerns in big data analytics. Businesses are appealing targets for hackers because they have so much valuable data under their control. Data breaches may have serious consequences, such as financial losses, harm to one’s reputation, and legal implications.
To prevent data breaches, businesses must use strong security measures including encryption, multi-factor authentication, and ongoing monitoring for unusual activity. Enterprises need to have a well-defined strategy in place for responding to data breaches, encompassing notifying individuals affected and implementing measures to mitigate the effect.
Conclusion
By providing crucial insights into consumer behavior and market trends, big data analytics has the power to transform organizations. Enormous power also comes with great responsibility. Therefore, enterprises must ensure they use data ethically and responsibly, while simultaneously maintaining the security and privacy of their customers’ information. By doing so, companies can not only gain customer trust but also realize the full potential of big data analytics.
To read more such blogs, visit TipsInLife
1 note · View note
mkcecollege · 6 months ago
Text
As this synergy grows, the future of engineering is set to be more collaborative, efficient, and innovative. Cloud computing truly bridges the gap between technical creativity and practical execution. To Know More: https://mkce.ac.in/blog/the-intersection-of-cloud-computing-and-engineering-transforming-data-management/
0 notes
pilog-group · 6 months ago
Text
Data Management & Governance in Digital Transformation: Insights from Dr. Imad Syed Live Podcast | PiLog Group
In the thought-provoking live podcast, “Data Management & Governance in Digital Transformation | Dr. Imad Syed Live Podcast”, Dr. Imad Syed dives deep into the critical role of data governance in shaping business success and shares actionable strategies for organizations to effectively manage their data ecosystems.
Watch the Full Podcast Here:
Why Data Governance is Critical in Digital Transformation
Ensures Data Accuracy & Integrity: Reliable data is the foundation of informed decision-making.
Enhances Compliance: Meet regulatory standards and avoid costly fines with proper governance frameworks.
Strengthens Data Security: Prevent breaches and unauthorized access through robust governance strategies.
Improves Data Usability: Organized data ensures stakeholders can extract valuable insights effortlessly.
Supports Scalability: Well-structured data systems grow seamlessly with your business.
Key Highlights from the Podcast:
Understanding Data Governance Frameworks: Learn the essential components of effective governance models.
Overcoming Data Management Challenges: Address common obstacles like data silos, duplication, and inconsistency.
Best Practices for Digital Transformation: Discover proven strategies for integrating data management in digital initiatives.
Building a Data-Driven Culture: Foster a mindset where every team member values data accuracy and security.
Future Trends in Data Governance: Stay ahead with insights into emerging technologies and methodologies.
Gain Expert Insights Now: Watch the Podcast Here
Who Should Watch This Podcast?
C-Level Executives: Understand how strategic data management drives business success.
IT Professionals: Learn how to implement secure and efficient data governance frameworks.
Data Analysts: Extract meaningful insights from well-governed data structures.
Business Leaders: Align digital strategies with strong data governance policies.
Students & Educators: Gain valuable knowledge about real-world data governance applications.
Best Practices for Effective Data Governance in Digital Transformation
Establish Clear Governance Policies: Define data access, usage, and security protocols.
Invest in Advanced Tools: Leverage modern data governance platforms for efficiency.
Train Your Teams: Build awareness about data privacy and compliance across all departments.
Adopt Data-Driven Decision Making: Empower teams with reliable, real-time insights.
Measure & Refine: Regularly evaluate governance strategies and make necessary adjustments.
How Effective Data Management Powers Digital Transformation
Faster Innovation Cycles: Data-driven insights accelerate product development and deployment.
Stronger Customer Relationships: Personalized data-driven experiences improve customer satisfaction.
Operational Efficiency: Streamlined data processes reduce waste and optimize resources.
Enhanced Decision-Making: Reliable data fosters confident, informed decisions.
Scalable Business Growth: Strong governance supports sustainable expansion across industries.
Why You Should Watch This Podcast?
In this engaging live session, Dr. Imad Syed shares profound insights into how data governance and management are reshaping industries in the digital age. Whether you’re navigating digital transformation, enhancing your data systems, or setting up governance policies, this podcast offers actionable knowledge you can implement immediately.
Tumblr media
Don’t Miss Out — Watch Now: Data Management & Governance in Digital Transformation | Dr. Imad Syed Live Podcast
Let us know your thoughts in the comments below. How is your organization leveraging data governance in its digital transformation journey?
1 note · View note
smartcitysystem · 7 months ago
Text
How Azure Cloud Improves Remote Work Solutions in Dubai
Tumblr media
As Dubai continues its journey toward becoming a global leader in digital transformation, businesses are increasingly adopting innovative technologies to remain competitive. The rise of remote work has created a need for reliable, scalable, and secure solutions to support distributed teams. Azure Cloud, a robust cloud computing platform from Microsoft, is proving to be a game-changer for enabling remote work in Dubai.
In this article, we’ll explore how Azure Cloud is transforming remote work for businesses in Dubai by enhancing productivity, ensuring security, and offering scalability.
The Growing Need for Remote Work Solutions in Dubai
Dubai is a global hub for commerce, technology, and innovation. With a diverse workforce and a dynamic economy, companies in the region need flexible solutions to adapt to:
The increasing prevalence of remote and hybrid work models.
Cross-border collaboration among multinational teams.
Digital tools are growing important in maintaining productivity and connectivity.
The COVID-19 pandemic accelerated the adoption of remote work globally, and Dubai was no exception. Businesses across various sectors quickly realized that traditional IT infrastructure was insufficient to meet the demands of remote work, leading to a surge in cloud adoption.
Azure Cloud stands out as a preferred choice for businesses in Dubai, thanks to its advanced capabilities and alignment with the region’s technological ambitions.
Key Azure Cloud Features That Support Remote Work
Azure Cloud offers a range of features specifically designed to support remote work environments. These include:
Virtual Desktop Infrastructure (VDI): Azure Virtual Desktop allows employees to access their work desktops and applications from anywhere securely.
Collaboration Tools: Seamless integration with Microsoft 365 enables efficient teamwork through apps like Teams, SharePoint, and OneDrive.
Scalable Storage: Azure provides secure, cloud-based storage solutions, ensuring employees can access and share files easily.
Identity and Access Management: Azure Active Directory ensures secure and role-based access to company resources.
Real-Time Analytics: Azure-powered insights help organizations monitor employee productivity and optimize workflows.
These features combine to create a robust ecosystem for managing remote teams effectively.
Benefits of Azure Cloud for Remote Work in Dubai
Enhanced Collaboration
One of the biggest challenges of remote work is maintaining seamless communication and collaboration. Azure Cloud integrates with Microsoft 365, enabling teams to:
Conduct virtual meetings via Microsoft Teams.
Share and co-edit documents in real-time using OneDrive.
Manage projects efficiently through SharePoint and Planner.
For Dubai’s multinational workforce, these tools are essential for bridging cultural and geographic gaps.
Improved Security
Data security is a top priority for businesses operating in Dubai, particularly those handling sensitive information. Azure Cloud offers:
End-to-End Encryption: Protects data during transmission and storage.
Advanced Threat Detection: AI-driven tools identify and mitigate potential cybersecurity threats.
Compliance with Global Standards: Azure complies with ISO, GDPR, and local data protection regulations in the UAE.
These security features provide peace of mind for organizations transitioning to remote work.
Cost-Efficiency
Azure’s pay-as-you-go model allows businesses to scale resources based on demand, reducing unnecessary expenses. This flexibility is especially beneficial for startups and SMEs in Dubai, which may have fluctuating workloads.
Seamless Scalability
As businesses grow, so do their technological needs. Azure Cloud ensures scalability without significant infrastructure investment, making it easier for Dubai companies to onboard new remote employees or expand operations.
Business Continuity
Azure’s disaster recovery and backup solutions ensure that businesses remain operational even during unexpected disruptions. This is crucial for remote teams that rely on uninterrupted access to tools and data.
Azure Cloud Solutions Tailored for Remote Work in Dubai
Azure Virtual Desktop
Azure Virtual Desktop allows employees to access their work environment securely from any device. It supports popular business applications and provides a consistent user experience, even in remote settings.
Example: A Dubai-based marketing agency uses Azure Virtual Desktop to enable its designers and content creators to collaborate on campaigns from different locations, ensuring continuity and quality.
Microsoft Teams on Azure
Microsoft Teams, hosted on Azure, is a central hub for communication and collaboration. It facilitates:
Video conferencing.
File sharing and real-time document editing.
Task management and workflow integration.
Example: A multinational logistics company in Dubai leverages Teams to coordinate operations across its global network.
Azure AI and Machine Learning
Azure’s AI-driven tools help businesses optimize remote work by providing:
Predictive analytics for workload management.
Chatbots for employee support.
Insights into team productivity and engagement.
Example: A healthcare provider in Dubai uses Azure AI to streamline administrative tasks, allowing remote employees to focus on patient care.
Success Stories: Dubai Businesses Embracing Azure Cloud
Financial Services Firm
A leading financial institution in Dubai adopted Azure Cloud to support its remote workforce. By implementing Azure Virtual Desktop and advanced security features, the firm improved employee productivity while ensuring compliance with regulatory standards.
Retail Chain
A retail chain with operations across the UAE used Azure to enable remote collaboration between its store managers and head office. This resulted in faster decision-making and streamlined operations.
Education Sector
A private university in Dubai leveraged Azure to offer virtual classrooms and remote access to educational resources. The platform ensured uninterrupted learning for students during the pandemic.
Azure Cloud and Dubai’s Vision for the Future
Dubai’s government is committed to fostering a digitally advanced economy through initiatives like the Dubai Smart City project and Dubai Internet City. Azure Cloud aligns perfectly with these ambitions by:
Supporting businesses in adopting cutting-edge technologies.
Enabling sustainable and flexible work models.
Enhancing the global competitiveness of Dubai’s economy.
Remote work is no longer just a trend but a key component of modern workforce strategies. Azure Cloud ensures that Dubai businesses are equipped to thrive in this new era.
Tips for Implementing Azure Cloud for Remote Work
To make the most of Azure Cloud’s capabilities, Dubai businesses should:
Assess Requirements: Identify the specific needs of your remote workforce.
Engage Experts: Work with Azure-certified partners in Dubai for seamless deployment.
Train Employees: Provide training to ensure employees can fully utilize Azure’s tools.
Monitor Performance: Use Azure’s analytics features to track productivity and optimize workflows.
Conclusion
Azure Cloud is revolutionizing remote work solutions for businesses in Dubai by offering advanced tools for collaboration, security, scalability, and efficiency. Its ability to support diverse industries and align with Dubai’s vision for digital transformation makes it an indispensable asset for the modern workforce.
As remote work becomes the new normal, adopting Azure Cloud can empower Dubai businesses to stay ahead of the curve, ensuring success in a rapidly evolving global economy.
0 notes
neilsblog · 7 months ago
Text
Growing Importance of Cloud Data Warehouses in Modern Business
Tumblr media
View On WordPress
0 notes
jcmarchi · 9 months ago
Text
Many organisations unprepared for AI cybersecurity threats
New Post has been published on https://thedigitalinsider.com/many-organisations-unprepared-for-ai-cybersecurity-threats/
Many organisations unprepared for AI cybersecurity threats
.pp-multiple-authors-boxes-wrapper display:none; img width:100%;
While AI improves the detection of cybersecurity threats, it simultaneously ushers in more advanced challenges.
Research from Keeper Security finds that, despite the implementation of AI-related policies, many organisations remain inadequately prepared for AI-powered threats.
84% of IT and security leaders find AI-enhanced tools have exacerbated the challenge of detecting phishing and smishing attacks, which were already significant threats. In response, 81% of organisations have enacted AI usage policies for employees. Confidence in these measures runs high, with 77% of leaders expressing familiarity with best practices for AI security.
Gap between AI cybersecurity policy and threats preparedness
More than half (51%) of security leaders view AI-driven attacks as the most severe threat to their organisations. Alarmingly, 35% of respondents feel ill-prepared to address these attacks compared to other cyber threats.
Organisations are deploying several key strategies to meet these emerging challenges:
Data encryption: Utilised by 51% of IT leaders, encryption serves as a crucial defence against unauthorised access and is vital against AI-fuelled attacks.
Employee training and awareness: With 45% of organisations prioritising enhanced training programmes, there is a focused effort to equip employees to recognise and counter AI-driven phishing and smishing intrusions.
Advanced threat detection systems: 41% of organisations are investing in these systems, underscoring the need for improved detection and response to sophisticated AI threats.
The advent of AI-driven cyber threats undeniably presents new challenges. Nevertheless, fundamental cybersecurity practices – such as data encryption, employee education, and advanced threat detection – continue to be essential. Organisations must ensure these essential measures are consistently re-evaluated and adjusted to counter emerging threats.
In addition to these core practices, advanced security frameworks like zero trust and Privileged Access Management (PAM) solutions can bolster an organisation’s resilience.
Zero trust demands continuous verification of all users, devices, and applications, reducing the risk of unauthorised access and minimising potential damage during an attack. PAM offers targeted security for an organisation’s most sensitive accounts, crucial for defending against complex AI-driven threats that aim at high-level credentials.
Darren Guccione, CEO and Co-Founder of Keeper Security, commented: “AI-driven attacks are a formidable challenge, but by reinforcing our cybersecurity fundamentals and adopting advanced security measures, we can build resilient defences against these evolving threats.”
Proactivity is also key for organisations—regularly reviewing security policies, performing routine audits, and fostering a culture of cybersecurity awareness are all essential.
While organisations are advancing, cybersecurity requires perpetual vigilance. Merging traditional practices with modern approaches like zero trust and PAM will empower organisations to maintain an edge over developing AI-powered threats.
(Photo by Growtika)
See also: King’s Business School: How AI is transforming problem-solving
Want to learn more about AI and big data from industry leaders? Check out AI & Big Data Expo taking place in Amsterdam, California, and London. The comprehensive event is co-located with other leading events including Intelligent Automation Conference, BlockX, Digital Transformation Week, and Cyber Security & Cloud Expo.
Explore other upcoming enterprise technology events and webinars powered by TechForge here.
Tags: ai, cyber security, cybersecurity, enterprise, infosec, report, security, study
0 notes
trainsinanime · 7 months ago
Text
Tumblr media
I've seen a number of people worried and concerned about this language on Ao3s current "agree to these terms of service" page. The short version is:
Don't worry. This isn't anything bad. Checking that box just means you forgive them for being US American.
Long version: This text makes perfect sense if you're familiar with the issues around GDPR and in particular the uncertainty about Privacy Shield and SCCs after Schrems II. But I suspect most people aren't, so let's get into it, with the caveat that this is a Eurocentric (and in particular EU centric) view of this.
The basic outline is that Europeans in the EU have a right to privacy under the EU's General Data Protection Regulation (GDPR), an EU directive (let's simplify things and call it an EU law) that regulates how various entities, including companies and the government, may acquire, store and process data about you.
The list of what counts as data about you is enormous. It includes things like your name and birthday, but also your email address, your computers IP address, user names, whatever. If an advertiser could want it, it's on the list.
The general rule is that they can't, unless you give explicit permission, or it's for one of a number of enumerated reasons (not all of which are as clear as would be desirable, but that's another topic). You have a right to request a copy of the data, you have a right to force them to delete their data and so on. It's not quite on the level of constitutional rights, but it is a pretty big deal.
In contrast, the US, home of most of the world's internet companies, has no such right at a federal level. If someone has your data, it is fundamentally theirs. American police, FBI, CIA and so on also have far more rights to request your data than the ones in Europe.
So how can an American website provide services to persons in the EU? Well… Honestly, there's an argument to be made that they can't.
US websites can promise in their terms and conditions that they will keep your data as safe as a European site would. In fact, they have to, unless they start specifically excluding Europeans. The EU even provides Standard Contract Clauses (SCCs) that they can use for this.
However, e.g. Facebook's T&Cs can't bind the US government. Facebook can't promise that it'll keep your data as secure as it is in the EU even if they wanted to (which they absolutely don't), because the US government can get to it easily, and EU citizens can't even sue the US government over it.
Despite the importance that US companies have in Europe, this is not a theoretical concern at all. There have been two successive international agreements between the US and the EU about this, and both were struck down by the EU court as being in violation of EU law, in the Schrems I and Schrems II decisions (named after Max Schrems, an Austrian privacy activist who sued in both cases).
A third international agreement is currently being prepared, and in the meantime the previous agreement (known as "Privacy Shield") remains tentatively in place. The problem is that the US government does not want to offer EU citizens equivalent protection as they have under EU law; they don't even want to offer US citizens these protections. They just love spying on foreigners too much. The previous agreements tried to hide that under flowery language, but couldn't actually solve it. It's unclear and in my opinion unlikely that they'll manage to get a version that survives judicial review this time. Max Schrems is waiting.
So what is a site like Ao3 to do? They're arguably not part of the problem, Max Schrems keeps suing Meta, not the OTW, but they are subject to the rules because they process stuff like your email address.
Their solution is this checkbox. You agree that they can process your data even though they're in the US, and they can't guarantee you that the US government won't spy on you in ways that would be illegal for the government of e.g. Belgium. Is that legal under EU law? …probably as legal as fan fiction in general, I suppose, which is to say let's hope nobody sues to try and find out.
But what's important is that nothing changed, just the language. Ao3 has always stored your user name and email address on servers in the US, subject to whatever the FBI, CIA, NSA and FRA may want to do it. They're just making it more clear now.
10K notes · View notes
zomb13s · 10 months ago
Text
The Illusion of Influence: An Examination of the Media, Security Agencies, and Technological Power in Shaping Public Perception
Introduction In today’s digital age, the boundary between reality and illusion has blurred significantly. This essay explores how the perception of magical influence, akin to saying “hocus pocus” and seeing changes unfold, mirrors the intricate interplay between journalism, security agencies, state agencies, and information specialists in contemporary society. By examining these mechanisms and…
0 notes
kishorxox · 4 months ago
Text
Big Data Security Market by Size, Share, Forecast, & Trends Analysis
Meticulous Research®—a leading global market research company, published a research report titled, ‘Big Data Security Market by Component (Solutions [Data Encryption, Security Intelligence, Data Backup & Recovery], Services), Deployment Mode, Organization Size, End User (IT & Telecom, BFSI, Retail & E-commerce), and Geography - Global Forecast to 2031.’
According to this latest publication from Meticulous Research®, the big data security market is projected to reach $60.1 billion by 2031, at a CAGR of 13.2% from 2024 to 2031. The growth of the big data security market is driven by the emergence of disruptive digital technologies, the increasing demand for data security and privacy solutions due to the rise in data breaches, and the growing data generation in the e-commerce industry. However, the high implementation costs of big data security solutions restrain the growth of this market.
Furthermore, the growing need for cloud-based security solutions and the increasing integration of AI, ML, and blockchain technologies in security solutions are expected to generate growth opportunities for the stakeholders in this market. However, the lack of knowledge about big data security solutions and the shortage of skilled IT professionals are major challenges impacting the growth of the big data security market.
The big data security market is segmented by component (solutions [data discovery and classification, data encryption {data protection, tokenization, data masking, other data encryption solutions}, security intelligence, data access control & authentication, data governance & compliance, data backup & recovery, data auditing & monitoring, other solutions], services [professional services, managed services]), deployment mode (on-premise deployments, cloud-based deployments), organization size (large enterprises, small & medium-sized enterprises), end user (IT & telecom, healthcare & pharmaceutical, BFSI, retail & e-commerce, energy & utilities, government, manufacturing, media & entertainment, transportation & logistics, and other end users). The study also evaluates industry competitors and analyzes the market at the regional and country levels.
Based on component, the big data security market is segmented into solutions and services. The solutions segment is further segmented into data discovery and classification, data encryption, security intelligence, data access control & authentication, data governance & compliance, data backup & recovery, data auditing & monitoring, and other solutions. In 2024, the solutions segment is expected to account for the larger share of the big data security market. The large market share of this segment is attributed to the increasing concerns regarding data security and privacy, the increasing adoption of data security solutions by SMEs, and the rising demand for encryption solutions for data protection across IoT devices. Big data security solutions include tools and measures to process or safeguard data and analytics processes. In March 2024, CrowdStrike, Inc. (U.S.) partnered with Rubrik, Inc. (U.S.) to transform data security solutions and stop breaches of critical information. Moreover, this segment is also projected to register the highest CAGR during the forecast period.
Based on deployment mode, the big data security market is segmented into on-premise deployments and cloud-based deployments. In 2024, the on-premise deployments segment is expected to account for the larger share of the big data security market. The large market share of this segment is attributed to the higher preference for on-premise deployments among large enterprises and increasing data generation in large enterprises. The on-premise model of deployment is majorly adopted by well-established and large companies that are capable of making capital investments toward the required hardware and hosting environments. In addition, these organizations also have sufficient in-house IT expertise to maintain software efficiency. Internal big data security is one of the major benefits of on-premise deployments.
However, the cloud-based deployments segment is projected to register the higher CAGR during the forecast period. The growth of this segment is driven by the rapid evolution of new security avenues for cloud-based deployments, the superior flexibility offered by cloud-based deployments, and the increase in security breaches. Cloud-based security solutions provide social networking privacy, system optimization, online storage, regulatory compliance, and connected device security. The adoption of cloud computing and storage systems is gaining popularity among small and medium-scale enterprises, supporting the growth of this segment.
Based on organization size, the big data security market is segmented into large enterprises and small & medium-sized enterprises. In 2024, the large enterprises segment is expected to account for the larger share of the big data security market. The large market share of this segment is attributed to the strong IT infrastructure of large enterprises, the growing adoption of advanced technologies such as AI, IoT, and blockchain, and the availability of skilled IT personnel to manage data security platforms. With larger budgets and a keen focus on developing strategic IT initiatives, large enterprises have a competitive advantage over small and medium-scale enterprises in terms of technology adoption. Large enterprises have a stable financial backup and can easily procure customized data security solutions, contributing to this segment's growth.
However, the small & medium-sized enterprises segment is projected to register the higher CAGR during the forecast period. The growth of this segment is driven by increasing digital transformation, government initiatives to promote security solutions, and the rising incidence of data breaches. SMEs are also increasingly becoming targets of cybercrime and therefore adopting suitable and strong security solutions.
Based on end user, the big data security market is segmented into IT & telecom, healthcare & pharmaceutical, BFSI, retail & e-commerce, energy & utilities, government, manufacturing, media & entertainment, transportation & logistics, and other end users. In 2024, the IT & telecom segment is expected to account for the largest share of the big data security market. The large market share of this segment is attributed to the increasing data breaches in IT companies as they store a vast amount of customer data, strict regulatory compliance forcing companies to implement stricter data security measures, and the increasing adoption of cloud-based solutions in the IT industry. In March 2023, IBM Corporation (U.S.) collaborated with Cohesity, Inc. (U.S.) to address increased data security and resiliency issues in hybrid cloud environments. With this collaboration, IBM launched its new IBM Storage Defender solution, including Cohesity's data protection, cyber resilience, and data management capabilities in the offering.
However, the healthcare & pharmaceutical segment is projected to register the highest CAGR during the forecast period. The growth of this segment is driven by the rising adoption of telemedicine devices and remote healthcare services, growing cyberattacks on connected devices, and the increasing demand for secure medical connected devices. A vast amount of medical data is generated in the healthcare sector. It is stored to improve patient outcomes, personalize treatment plans, and develop new drugs, among other applications. However, this sensitive data requires robust security measures to protect patient privacy and prevent unauthorized access. In November 2021, Armis, Inc. (U.S.) partnered with Nuvolo (U.S.) to improve data interoperability and the overall risk posture of healthcare organizations.
Based on geography, the big data security market is segmented into North America, Europe, Asia-Pacific, Latin America, and the Middle East & Africa. In 2024, North America is expected to account for the largest share of the big data security market. The market growth in North America is driven by the presence of prominent players offering advanced big data security solutions & services, the early adoption of disruptive technologies, and growing awareness regarding data security. North America is home to several major players that provide products and services to improve big data security measures for IT assets, data, and privacy across different domains. Thus, big data security companies operating in the North America region are investing heavily in R&D activities to develop new & advanced security solutions that can address rising security challenges. In February 2024, Cyberhaven, Inc. (U.S.) launched Linea AI, an AI platform designed to combat the critical insider risks threatening vital corporate data.
However, the Asia-Pacific region is projected to record the highest CAGR during the forecast period. The growth of this market is driven by the growing data breaches, supportive government initiatives, and growing awareness regarding data security among small and medium-scale organizations. In December 2023, Safetica a.s. (U.S.) partnered with Kaira Global (Singapore) to deliver Safetica's Data Loss Prevention (DLP) solutions for enterprises of all sizes to safeguard their data against insider risks and data breaches in Singapore. APAC is the fastest-growing big data security market due to rapid investments in IT infrastructure, extensive use of the Internet, and growing security challenges.
Key Players
The key players operating in the big data security market are Check Point Software Technologies, Ltd. (Israel), Cisco Systems, Inc. (U.S.), Fortinet, Inc. (U.S.), Oracle Corporation (U.S.), IBM Corporation (U.S.), Microsoft Corporation (U.S.), Hewlett Packard Enterprise Development LP (U.S.), Intel Corporation (U.S.), Palo Alto Networks, Inc. (U.S.), Thales Group (France), Juniper Networks, Inc. (U.S.), Broadcom, Inc. (U.S.), Dell Technologies, Inc. (U.S.), CyberArk Software Ltd. (U.S.), and Rapid7, Inc. (U.S.).
Download Sample Report Here @ https://www.meticulousresearch.com/download-sample-report/cp_id=4984
Key Questions Answered in the Report:
What are the high-growth market segments in terms of the component, deployment mode, organization size, and end user?
What is the historical market size for the global big data security market?
What are the market forecasts and estimates for 2024–2031?
What are the major drivers, restraints, opportunities, challenges, and trends in the global big data security market?
Who are the major players in the global big data security market, and what are their market shares?
What is the competitive landscape like?
What are the recent developments in the global big data security market?
What are the different strategies adopted by major market players?
What are the trends and high-growth countries?
Who are the local emerging players in the global big data security market, and how do they compete with the other players?
Contact Us: Meticulous Research® [email protected] Contact Sales- +1-646-781-8004 Connect with us on LinkedIn- https://www.linkedin.com/company/meticulous-research
0 notes
vastedge330 · 10 months ago
Text
Learn essential strategies for securing and protecting your big data in this comprehensive blog post. It covers best practices for data encryption, access control, and threat detection to ensure your valuable information remains safe from breaches and cyber threats. Equip yourself with the knowledge to implement robust data protection measures effectively.
0 notes
enduradata · 1 year ago
Text
0 notes
rajaniesh · 1 year ago
Text
Scaling Your Data Mesh Architecture for maximum efficiency and interoperability
Tumblr media
View On WordPress
0 notes
astrofaeology · 1 month ago
Text
Mercury in the Houses
Tumblr media Tumblr media Tumblr media
paid readings | Masterlist
1st house When Mercury resides here, your very essence speaks. Your intellect shapes your persona; you are a naturally curious individual, expressing yourself directly and often with remarkable openness. This placement signifies a mind that is constantly engaged with learning, readily absorbing information from your surroundings and projecting your thoughts outward. You possess a distinct verbal presence, making your initial impressions impactful.
2nd house Mercury in this house means your mind focuses on resources and values. You think practically about money, possessions, and security. Communication skills are often tied to earning or acquiring. You might articulate well about finances, business ventures, or what you deem worthwhile. This placement suggests a cleverness regarding material matters, and perhaps a talent for verbalizing your worth.
3rd house This is Mercury's natural domain, intensifying its qualities. Your intellect is incredibly agile, absorbing vast amounts of data from your immediate environment. You are a natural communicator, excelling in everyday conversations, writing, and short journeys. Curiosity drives you to learn continuously, making you adept at various forms of expression and connecting with siblings or local communities.
4th house Mercury in this position indicates a mind deeply connected to home, family, and personal roots. Your thoughts often revolve around domestic matters, security, and your heritage. Communication within the family unit is crucial, and you may enjoy intellectual discussions at home. This placement suggests a reflective intellect, often seeking inner peace through understanding your foundational experiences.
5th house Mercury here indicates that you have a mind that's has a natural disposition towards the arts and creativity. You communicate with zest, finding joy in self-expression and intellectual challenges. This position suggests a talent for entertainment, teaching, or any activity where you can blend wit with imaginative flair.
6th house Mercury in this house means your intellect is directed towards practical concerns, work, and well-being. You possess an analytical mind, excelling at organization, problem-solving, and managing details. Communication is precise and efficient, often focused on daily routines, service to others, or health matters. This placement highlights a knack for methodical thinking and a desire for order.
7th house Mercury here emphasizes intellect in partnerships and relationships. You seek mental stimulation from others, thriving on discussions and exchanges of viewpoints. Communication is key to your one-on-one interactions, and you often prefer fair, balanced dialogue. This position suggests a person who learns through relating to others and may be drawn to intellectual alliances.
8th house This placement points to a profound and investigative mind. You delve into mysteries, hidden truths, and complex subjects like psychology, shared resources, or transformation. Your communication is often intense and probing, seeking deeper understanding beneath the surface. You may be drawn to research, occult studies, or uncovering secrets.
9th house Mercury in this house means your intellect expands into higher learning, philosophy, and foreign cultures. You possess a broad perspective, eager to explore different belief systems and distant lands. Communication is often philosophical, inspiring, and focused on big ideas. This position suggests a natural teacher, traveler, or someone deeply interested in global thought.
10th house Mercury in this house places your intellect and communication firmly in your career and public image. You express yourself professionally, often through writing, speaking, or strategic planning within your vocation. Your mind is geared towards achieving success and establishing authority. This placement indicates a person whose reputation is shaped by their articulate nature and intellectual contributions.
11th house Here, Mercury's influence extends to your social groups, aspirations, and humanitarian ideals. Your intellect thrives in collective settings, engaging in discussions about future possibilities and shared objectives. You communicate effectively within teams, contributing innovative ideas and fostering connections based on mutual interests. This position suggests a mind focused on progress and community.
12th house When Mercury is in this house, your intellect operates in subtle, often hidden ways. You possess a highly intuitive and introspective mind, processing information through dreams, intuition, and unspoken cues. Communication may be less direct, leaning towards creative expression, spiritual contemplation, or working behind the scenes. This placement suggests a mind that finds peace in solitude and deep reflection.
Tumblr media
DISCLAIMER: This post is a generalisation and may not resonate. I recommend you get a reading from an astrologer (me). If you want a reading from me check out my sales page.
@astrofaeology private services 2025 all rights reserved
564 notes · View notes
mostlysignssomeportents · 7 months ago
Text
Bossware is unfair (in the legal sense, too)
Tumblr media
You can get into a lot of trouble by assuming that rich people know what they're doing. For example, might assume that ad-tech works – bypassing peoples' critical faculties, reaching inside their minds and brainwashing them with Big Data insights, because if that's not what's happening, then why would rich people pour billions into those ads?
https://pluralistic.net/2020/12/06/surveillance-tulip-bulbs/#adtech-bubble
You might assume that private equity looters make their investors rich, because otherwise, why would rich people hand over trillions for them to play with?
https://thenextrecession.wordpress.com/2024/11/19/private-equity-vampire-capital/
The truth is, rich people are suckers like the rest of us. If anything, succeeding once or twice makes you an even bigger mark, with a sense of your own infallibility that inflates to fill the bubble your yes-men seal you inside of.
Rich people fall for scams just like you and me. Anyone can be a mark. I was:
https://pluralistic.net/2024/02/05/cyber-dunning-kruger/#swiss-cheese-security
But though rich people can fall for scams the same way you and I do, the way those scams play out is very different when the marks are wealthy. As Keynes had it, "The market can remain irrational longer than you can remain solvent." When the marks are rich (or worse, super-rich), they can be played for much longer before they go bust, creating the appearance of solidity.
Noted Keynesian John Kenneth Galbraith had his own thoughts on this. Galbraith coined the term "bezzle" to describe "the magic interval when a confidence trickster knows he has the money he has appropriated but the victim does not yet understand that he has lost it." In that magic interval, everyone feels better off: the mark thinks he's up, and the con artist knows he's up.
Rich marks have looong bezzles. Empirically incorrect ideas grounded in the most outrageous superstition and junk science can take over whole sections of your life, simply because a rich person – or rich people – are convinced that they're good for you.
Take "scientific management." In the early 20th century, the con artist Frederick Taylor convinced rich industrialists that he could increase their workers' productivity through a kind of caliper-and-stopwatch driven choreographry:
https://pluralistic.net/2022/08/21/great-taylors-ghost/#solidarity-or-bust
Taylor and his army of labcoated sadists perched at the elbows of factory workers (whom Taylor referred to as "stupid," "mentally sluggish," and as "an ox") and scripted their motions to a fare-the-well, transforming their work into a kind of kabuki of obedience. They weren't more efficient, but they looked smart, like obedient robots, and this made their bosses happy. The bosses shelled out fortunes for Taylor's services, even though the workers who followed his prescriptions were less efficient and generated fewer profits. Bosses were so dazzled by the spectacle of a factory floor of crisply moving people interfacing with crisply working machines that they failed to understand that they were losing money on the whole business.
To the extent they noticed that their revenues were declining after implementing Taylorism, they assumed that this was because they needed more scientific management. Taylor had a sweet con: the worse his advice performed, the more reasons their were to pay him for more advice.
Taylorism is a perfect con to run on the wealthy and powerful. It feeds into their prejudice and mistrust of their workers, and into their misplaced confidence in their own ability to understand their workers' jobs better than their workers do. There's always a long dollar to be made playing the "scientific management" con.
Today, there's an app for that. "Bossware" is a class of technology that monitors and disciplines workers, and it was supercharged by the pandemic and the rise of work-from-home. Combine bossware with work-from-home and your boss gets to control your life even when in your own place – "work from home" becomes "live at work":
https://pluralistic.net/2021/02/24/gwb-rumsfeld-monsters/#bossware
Gig workers are at the white-hot center of bossware. Gig work promises "be your own boss," but bossware puts a Taylorist caliper wielder into your phone, monitoring and disciplining you as you drive your wn car around delivering parcels or picking up passengers.
In automation terms, a worker hitched to an app this way is a "reverse centaur." Automation theorists call a human augmented by a machine a "centaur" – a human head supported by a machine's tireless and strong body. A "reverse centaur" is a machine augmented by a human – like the Amazon delivery driver whose app goads them to make inhuman delivery quotas while punishing them for looking in the "wrong" direction or even singing along with the radio:
https://pluralistic.net/2024/08/02/despotism-on-demand/#virtual-whips
Bossware pre-dates the current AI bubble, but AI mania has supercharged it. AI pumpers insist that AI can do things it positively cannot do – rolling out an "autonomous robot" that turns out to be a guy in a robot suit, say – and rich people are groomed to buy the services of "AI-powered" bossware:
https://pluralistic.net/2024/01/29/pay-no-attention/#to-the-little-man-behind-the-curtain
For an AI scammer like Elon Musk or Sam Altman, the fact that an AI can't do your job is irrelevant. From a business perspective, the only thing that matters is whether a salesperson can convince your boss that an AI can do your job – whether or not that's true:
https://pluralistic.net/2024/07/25/accountability-sinks/#work-harder-not-smarter
The fact that AI can't do your job, but that your boss can be convinced to fire you and replace you with the AI that can't do your job, is the central fact of the 21st century labor market. AI has created a world of "algorithmic management" where humans are demoted to reverse centaurs, monitored and bossed about by an app.
The techbro's overwhelming conceit is that nothing is a crime, so long as you do it with an app. Just as fintech is designed to be a bank that's exempt from banking regulations, the gig economy is meant to be a workplace that's exempt from labor law. But this wheeze is transparent, and easily pierced by enforcers, so long as those enforcers want to do their jobs. One such enforcer is Alvaro Bedoya, an FTC commissioner with a keen interest in antitrust's relationship to labor protection.
Bedoya understands that antitrust has a checkered history when it comes to labor. As he's written, the history of antitrust is a series of incidents in which Congress revised the law to make it clear that forming a union was not the same thing as forming a cartel, only to be ignored by boss-friendly judges:
https://pluralistic.net/2023/04/14/aiming-at-dollars/#not-men
Bedoya is no mere historian. He's an FTC Commissioner, one of the most powerful regulators in the world, and he's profoundly interested in using that power to help workers, especially gig workers, whose misery starts with systemic, wide-scale misclassification as contractors:
https://pluralistic.net/2024/02/02/upward-redistribution/
In a new speech to NYU's Wagner School of Public Service, Bedoya argues that the FTC's existing authority allows it to crack down on algorithmic management – that is, algorithmic management is illegal, even if you break the law with an app:
https://www.ftc.gov/system/files/ftc_gov/pdf/bedoya-remarks-unfairness-in-workplace-surveillance-and-automated-management.pdf
Bedoya starts with a delightful analogy to The Hawtch-Hawtch, a mythical town from a Dr Seuss poem. The Hawtch-Hawtch economy is based on beekeeping, and the Hawtchers develop an overwhelming obsession with their bee's laziness, and determine to wring more work (and more honey) out of him. So they appoint a "bee-watcher." But the bee doesn't produce any more honey, which leads the Hawtchers to suspect their bee-watcher might be sleeping on the job, so they hire a bee-watcher-watcher. When that doesn't work, they hire a bee-watcher-watcher-watcher, and so on and on.
For gig workers, it's bee-watchers all the way down. Call center workers are subjected to "AI" video monitoring, and "AI" voice monitoring that purports to measure their empathy. Another AI times their calls. Two more AIs analyze the "sentiment" of the calls and the success of workers in meeting arbitrary metrics. On average, a call-center worker is subjected to five forms of bossware, which stand at their shoulders, marking them down and brooking no debate.
For example, when an experienced call center operator fielded a call from a customer with a flooded house who wanted to know why no one from her boss's repair plan system had come out to address the flooding, the operator was punished by the AI for failing to try to sell the customer a repair plan. There was no way for the operator to protest that the customer had a repair plan already, and had called to complain about it.
Workers report being sickened by this kind of surveillance, literally – stressed to the point of nausea and insomnia. Ironically, one of the most pervasive sources of automation-driven sickness are the "AI wellness" apps that bosses are sold by AI hucksters:
https://pluralistic.net/2024/03/15/wellness-taylorism/#sick-of-spying
The FTC has broad authority to block "unfair trade practices," and Bedoya builds the case that this is an unfair trade practice. Proving an unfair trade practice is a three-part test: a practice is unfair if it causes "substantial injury," can't be "reasonably avoided," and isn't outweighed by a "countervailing benefit." In his speech, Bedoya makes the case that algorithmic management satisfies all three steps and is thus illegal.
On the question of "substantial injury," Bedoya describes the workday of warehouse workers working for ecommerce sites. He describes one worker who is monitored by an AI that requires him to pick and drop an object off a moving belt every 10 seconds, for ten hours per day. The worker's performance is tracked by a leaderboard, and supervisors punish and scold workers who don't make quota, and the algorithm auto-fires if you fail to meet it.
Under those conditions, it was only a matter of time until the worker experienced injuries to two of his discs and was permanently disabled, with the company being found 100% responsible for this injury. OSHA found a "direct connection" between the algorithm and the injury. No wonder warehouses sport vending machines that sell painkillers rather than sodas. It's clear that algorithmic management leads to "substantial injury."
What about "reasonably avoidable?" Can workers avoid the harms of algorithmic management? Bedoya describes the experience of NYC rideshare drivers who attended a round-table with him. The drivers describe logging tens of thousands of successful rides for the apps they work for, on promise of "being their own boss." But then the apps start randomly suspending them, telling them they aren't eligible to book a ride for hours at a time, sending them across town to serve an underserved area and still suspending them. Drivers who stop for coffee or a pee are locked out of the apps for hours as punishment, and so drive 12-hour shifts without a single break, in hopes of pleasing the inscrutable, high-handed app.
All this, as drivers' pay is falling and their credit card debts are mounting. No one will explain to drivers how their pay is determined, though the legal scholar Veena Dubal's work on "algorithmic wage discrimination" reveals that rideshare apps temporarily increase the pay of drivers who refuse rides, only to lower it again once they're back behind the wheel:
https://pluralistic.net/2023/04/12/algorithmic-wage-discrimination/#fishers-of-men
This is like the pit boss who gives a losing gambler some freebies to lure them back to the table, over and over, until they're broke. No wonder they call this a "casino mechanic." There's only two major rideshare apps, and they both use the same high-handed tactics. For Bedoya, this satisfies the second test for an "unfair practice" – it can't be reasonably avoided. If you drive rideshare, you're trapped by the harmful conduct.
The final prong of the "unfair practice" test is whether the conduct has "countervailing value" that makes up for this harm.
To address this, Bedoya goes back to the call center, where operators' performance is assessed by "Speech Emotion Recognition" algorithms, a psuedoscientific hoax that purports to be able to determine your emotions from your voice. These SERs don't work – for example, they might interpret a customer's laughter as anger. But they fail differently for different kinds of workers: workers with accents – from the American south, or the Philippines – attract more disapprobation from the AI. Half of all call center workers are monitored by SERs, and a quarter of workers have SERs scoring them "constantly."
Bossware AIs also produce transcripts of these workers' calls, but workers with accents find them "riddled with errors." These are consequential errors, since their bosses assess their performance based on the transcripts, and yet another AI produces automated work scores based on them.
In other words, algorithmic management is a procession of bee-watchers, bee-watcher-watchers, and bee-watcher-watcher-watchers, stretching to infinity. It's junk science. It's not producing better call center workers. It's producing arbitrary punishments, often against the best workers in the call center.
There is no "countervailing benefit" to offset the unavoidable substantial injury of life under algorithmic management. In other words, algorithmic management fails all three prongs of the "unfair practice" test, and it's illegal.
What should we do about it? Bedoya builds the case for the FTC acting on workers' behalf under its "unfair practice" authority, but he also points out that the lack of worker privacy is at the root of this hellscape of algorithmic management.
He's right. The last major update Congress made to US privacy law was in 1988, when they banned video-store clerks from telling the newspapers which VHS cassettes you rented. The US is long overdue for a new privacy regime, and workers under algorithmic management are part of a broad coalition that's closer than ever to making that happen:
https://pluralistic.net/2023/12/06/privacy-first/#but-not-just-privacy
Workers should have the right to know which of their data is being collected, who it's being shared by, and how it's being used. We all should have that right. That's what the actors' strike was partly motivated by: actors who were being ordered to wear mocap suits to produce data that could be used to produce a digital double of them, "training their replacement," but the replacement was a deepfake.
With a Trump administration on the horizon, the future of the FTC is in doubt. But the coalition for a new privacy law includes many of Trumpland's most powerful blocs – like Jan 6 rioters whose location was swept up by Google and handed over to the FBI. A strong privacy law would protect their Fourth Amendment rights – but also the rights of BLM protesters who experienced this far more often, and with far worse consequences, than the insurrectionists.
The "we do it with an app, so it's not illegal" ruse is wearing thinner by the day. When you have a boss for an app, your real boss gets an accountability sink, a convenient scapegoat that can be blamed for your misery.
The fact that this makes you worse at your job, that it loses your boss money, is no guarantee that you will be spared. Rich people make great marks, and they can remain irrational longer than you can remain solvent. Markets won't solve this one – but worker power can.
Tumblr media
Image: Cryteria (modified) https://commons.wikimedia.org/wiki/File:HAL9000.svg
CC BY 3.0 https://creativecommons.org/licenses/by/3.0/deed.en
2K notes · View notes