Comprehensive software reviews to make better IT decisions
OneTrust Dips Its Toes Into the AI Pond With Launch of OneTrust Athena
OneTrust challenges the antiquated idea of data privacy and AI as stark opponents, with the introduction of OneTrust Athena, the vendor’s AI and robotic automation-powered platform.
For those familiar with the data privacy vendor space, OneTrust’s move to integrate AI capabilities within its already comprehensive suite of privacy and compliance offering likely comes with little surprise. The platform leverages the data intelligence gathered from OneTrust’s regulatory research platform, DataGuidance, to drive AI-powered bots in supporting organizations to meet their data privacy compliance obligations.
The solution provides capabilities ranging from data classification and discovery to automating regulatory-related tasks specific to the privacy scope of the organization (think GDPR), and leaps so far as to provide predictions and informed solutions on unidentified risks to the organization.
While we may have seen it coming, we may not have predicted just how timely the cross-over between the AI and the data privacy worlds would occur. Data privacy has a long-standing reputation of being an obstacle to AI integration; an insurmountable barrier placed directly in front of organizations. However, if we apply a different approach, and instead view adequate data privacy controls as a means of effectively implementing AI that scales to the internal and external environment of an organization, the interdependency between the two becomes evident.
As OneTrust adopts the first-to-market role with respect to significant AI integration in the data privacy software space, we can expect to see many vendors follow suite. This will lead to an improved and strengthened relationship between two previously separate functions. Additionally, we predict that the synergy will assist organizations greater efficiency in their privacy management capabilities.
Want to Know More?
PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.
Startup security vendor SECURITI.ai wins RSAC “Most Innovative Startup” at the RSA Conference 2020 Innovation Sandbox Contest.
Osano recently released its SaaS privacy solution aimed at simplifying compliance and vendor assessments. The product feels familiar, but Osano’s ethical commitment sets it apart from the crowd.
DataStealth is a difficult product to classify. It resembles DLP and privacy software but doesn’t fit neatly in either category. DataStealth focuses on data obfuscation, using a novel approach aimed at limiting sensitive-data acquisition.
TrustArc has announced the acquisition of Canadian counterpart, Nymity – a more boutique-style vendor known for its very high standard of privacy research, expertise which manifests in its product offering.
Privacy by Design (PbD) is a General Data Protection Regulation (GDPR) requirement, but effective implementation requires deep insight into the operation and interconnection of various data collection processes. Thus, PbD can be difficult to document and demonstrate. However, Proteus may help.
The US Federal Trade Commission announced both a $5-billion settlement with Facebook and a $575-million penalty against Equifax in the same week. Both were for data breaches – the Equifax case affected 147 million people, and the Facebook incident 87 million. So why is Facebook being hit with the heavier penalty?
Amazon’s AWS Santa Clara Summit ‘19 has been chockful of exciting product announcements, including AWS Deep Learning Containers, a service that provides Docker images that will simplify deployment of TensorFlow or ApacheMXNet workloads for training deep learning algorithms (at least according to Amazon).
Academia often struggles to keep up with the evolving cybersecurity landscape, and employers often note that the technical and soft skills learned in education programs lack real-world application. It involves both education and corporate training to build a strong cybersecurity workforce.