Skip to main content

The Role of Emerging Technologies in Enterprise Strategy

Jacek Chmiel
Avenga

Enterprise privacy is viewed more as a challenge and bottleneck in adopting AI and cloud API-driven projects than an opportunity to lower the risk of image and money loss thanks to novel technological solutions. There's a lot of focus on regulatory paperwork, and declarative formal privacy. Departments were created, roles were set, people were assigned, and privacy policies were written and published. Cookie warnings are implemented on corporate websites and mobile apps, etc. So from the basic regulatory obligations, all the requirements are met and fingers crossed that incoming regulations will not require too much additional effort.

However, behind the closed doors of decision-makers, real privacy protection thanks to technology and processes is often portrayed as too hard and too costly to implement. So the most common strategy is to do as little as possible just to conform to formal requirements of current and incoming regulations.

This is a missed opportunity because true privacy protection can be achieved with the right set of processes and technologies without killing the budget. The strategy of deprioritization and effort minimization unfortunately means that many technology teams are not even aware of available privacy protection options and progress in the field.

No Privacy without Security

First, there's no privacy without security, we need to connect both instead of separating them as issues because they are heavily interdependent. The security landscape is demanding more attention than ever, and getting more complex. We observe increased sophistication of cyberattacks on both social and technological levels. It doesn't mean that security and privacy improvements are blocking each other, they can and should be progressing in parallel, but understanding mutual dependencies is the key to the success for both.

Basic rules and fundamentals of security, are not that different from those twenty years ago. Memory attack vulnerabilities are still dominating, as most of the system-level software is still written in unsafe C and C derivatives. Browsers suffer from client-side attacks targeting rendering and JavaScript engines. The thing that changes the most is the pace of change due to automation and the rise of state-sponsored hacking groups targeting competitors and enemies in trade and hybrid cyber warfare.

AI-driven attackers are much more successful and automated than they used to be. AI-supported defenders also get new tools, and more advanced scanners at the source code, container, and runtime levels. However, the defense seems to be at a comparative disadvantage.

The fundamentals of security change slowly, which unfortunately does not mean they are perfectly implemented. Daily reports of data leaks typically comes down to the usual set of mishaps on the data owners and processing sites.

Data Needs to Be Protected

Decades-old strategies such as data minimization are still not a norm, as even simple transactions require users to provide too much information than is necessary to perform the transactions. The pressure to know and target customers better allow companies to get tons of telemetric data, bordering or crossing privacy violation borders of individuals and organizations.

Avoiding data copies is another recommendation that is true today and is not going away anytime soon. Unfortunately, data is copied unnecessarily which makes data retention policies much harder, and allows for a much larger data attack surface, without proper processes and tools. This also includes the rise of observability in distributed systems, which can create copies of sensitive data in the system logs that are hard to detect and remove.

Data retention conformance still relies too much on declarative statements than the physical destruction of data, for instance, already trained machine learning models make it almost impossible and it's a secret that everyone in the AI industry knows well. The models would have to be retrained with specific source data removed which is very costly and time-consuming. And that's on top of existing issues of backups and logs stored for years in digital archives.

Privacy of public LLM services has also been proven questionable, as uploaded corporate data containing business secrets as well as sensitive personal data are then used for model training. Free public services used by corporate users (instead o or besides corporate chatbots) often come with a hidden privacy "price," as the saying goes "if it appears to be free, you are the product."

Language models and machine learning models in general exhibit a memorization problem that leaks sensitive data with malicious prompting. Local Small Language Models (SLM) combined with Retrieval Augmented Generation (RAGs) are alternative that balances model performance with guarantees that no documents will be used to train global models. Another option is to rely on signed agreements with big tech companies and rely on their declarations of not using corporate data for model training.

Multi-device usage and bring-your-device (BYOD) trends mean that mobile applications requesting too many permissions to track users may contribute negatively to the privacy exposing data of employees, customers, and patients. There are corporate policies that reduce the exposure of corporate data, they need to be implemented correctly, however, devices do increase the attack surface and risks.

PET to the Rescue

Privacy Enhancing Technologies such as Differential Privacy (DP) are already mature enough to be used in real-world applications. They practically mean a slight deterioration of data usability but make it much harder to identify individuals. The tradeoff between privacy and data value should be considered every time there's a risk of data exposure, with a slight addition of controllable noise we can gain a much higher protection of data and machine learning models against membership inference attacks.

The federated learning strategy helps to train models without moving or accessing any sensitive data, avoiding data copy (and data retention) problems altogether. Data sharing agreements do not need to be signed, as there is no data sharing, of course, the operations performed must be non-disclosive, the models cannot be overtrained and assumed 100% private, so there's room for secure aggregation and differential privacy.

The space of PET is maturing fast, it's underestimated but it could dramatically improve privacy protection when combined with enterprise security and privacy-preserving mindset.

Confidential Computing

Another emerging technology is confidential computing which protects companies and their data against malicious administrations of hosting and cloud services. No one except people who are allowed from the company can access data at any time as it is always kept encrypted and the cloud provider does not have the keys. The technologies are improving fast, and there are already practical applications. The near-term future is expected to deliver on the promise of CPU and GPU accelerated workloads, very important for the entire machine learning field, including generative AI.

Future

The pressure on privacy put by the regulators is only going to increase. Fortunately, there's an entire ecosystem of strategies, technologies, and tools to help to minimize the risks without significantly affecting the IT budgets. Federated networks of (limited) trust are growing, privacy enhancing techniques deliver better results at a lower cost of data value. Confidential computing is improving fast and slowly gaining traction. In the times of generative AI news thrown at us daily it's easy to overlook the significant technological progress in this area of privacy protection due to technological advances. When combined with the right process and, most importantly, a privacy-preserving attitude of individuals and entire organizations, privacy can become a part of competitive advantage, significantly lowering risks of image and reputation damage and money loss due to regulation violations.

Jacek Chmiel is Director of Avenga Labs

Hot Topics

The Latest

Like most digital transformation shifts, organizations often prioritize productivity and leave security and observability to keep pace. This usually translates to both the mass implementation of new technology and fragmented monitoring and observability (M&O) tooling. In the era of AI and varied cloud architecture, a disparate observability function can be dangerous. IT teams will lack a complete picture of their IT environment, making it harder to diagnose issues while slowing down mean time to resolve (MTTR). In fact, according to recent data from the SolarWinds State of Monitoring & Observability Report, 77% of IT personnel said the lack of visibility across their on-prem and cloud architecture was an issue ...

In MEAN TIME TO INSIGHT Episode 23, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the NetOps labor shortage ... 

Technology management is evolving, and in turn, so is the scope of FinOps. The FinOps Foundation recently updated their mission statement from "advancing the people who manage the value of cloud" to "advancing the people who manage the value of technology." This seemingly small change solidifies a larger evolution: FinOps practitioners have organically expanded to be focused on more than just cloud cost optimization. Today, FinOps teams are largely — and quickly — expanding their job descriptions, evolving into a critical function for managing the full value of technology ...

Enterprises are under pressure to scale AI quickly. Yet despite considerable investment, adoption continues to stall. One of the most overlooked reasons is vendor sprawl ... In reality, no organization deliberately sets out to create sprawling vendor ecosystems. More often, complexity accumulates over time through well-intentioned initiatives, such as enterprise-wide digital transformation efforts, point solutions, or decentralized sourcing strategies ...

Nearly every conversation about AI eventually circles back to compute. GPUs dominate the headlines while cloud platforms compete for workloads and model benchmarks drive investment decisions. But underneath that noise, a quieter infrastructure challenge is taking shape. The real bottleneck in enterprise AI is not processing power, it is the ability to store, manage and retrieve the relentless volumes of data that AI systems generate, consume and multiply ...

The 2026 Observability Survey from Grafana Labs paints a vivid picture of an industry maturing fast, where AI is welcomed with careful conditions, SaaS economics are reshaping spending decisions, complexity remains a defining challenge, and open standards continue to underpin it all ...

The observability industry has an evolving relationship with AI. We're not skeptics, but it's clear that trust in AI must be earned ... In Grafana Labs' annual Observability Survey, 92% said they see real value in AI surfacing anomalies before they cause downtime. Another 91% endorsed AI for forecasting and root cause analysis. So while the demand is there, customers need it to be trustworthy, as the survey also found that the practitioners most enthusiastic about AI are also the most insistent on explainability ...

In the modern enterprise, the conversation around AI has moved past skepticism toward a stage of active adoption. According to our 2026 State of IT Trends Report: The Human Side of Autonomous AI, nearly 90% of IT professionals view AI as a net positive, and this optimism is well-founded. We are seeing agentic AI move beyond simple automation to actively streamlining complex data insights and eliminating the manual toil that has long hindered innovation. However, as we integrate these autonomous agents into our ecosystems, the fundamental DNA of the IT role is evolving ...

AI workloads require an enormous amount of computing power ... What's also becoming abundantly clear is just how quickly AI's computing needs are leading to enterprise systems failure. According to Cockroach Labs' State of AI Infrastructure 2026 report, enterprise systems are much closer to failure than their organizations realize. The report ... suggests AI scale could cause widespread failures in as little as one year — making it a clear risk for business performance and reliability.

The quietest week your engineering team has ever had might also be its best. No alarms going off. No escalations. No frantic Teams or Slack threads at 2 a.m. Everything humming along exactly as it should. And somewhere in a leadership meeting, someone looks at the metrics dashboard, sees a flat line of incidents and says: "Seems like things are pretty calm over there. Do we really need all those people?" ... I've spent many years in engineering, and this pattern keeps repeating ...

The Role of Emerging Technologies in Enterprise Strategy

Jacek Chmiel
Avenga

Enterprise privacy is viewed more as a challenge and bottleneck in adopting AI and cloud API-driven projects than an opportunity to lower the risk of image and money loss thanks to novel technological solutions. There's a lot of focus on regulatory paperwork, and declarative formal privacy. Departments were created, roles were set, people were assigned, and privacy policies were written and published. Cookie warnings are implemented on corporate websites and mobile apps, etc. So from the basic regulatory obligations, all the requirements are met and fingers crossed that incoming regulations will not require too much additional effort.

However, behind the closed doors of decision-makers, real privacy protection thanks to technology and processes is often portrayed as too hard and too costly to implement. So the most common strategy is to do as little as possible just to conform to formal requirements of current and incoming regulations.

This is a missed opportunity because true privacy protection can be achieved with the right set of processes and technologies without killing the budget. The strategy of deprioritization and effort minimization unfortunately means that many technology teams are not even aware of available privacy protection options and progress in the field.

No Privacy without Security

First, there's no privacy without security, we need to connect both instead of separating them as issues because they are heavily interdependent. The security landscape is demanding more attention than ever, and getting more complex. We observe increased sophistication of cyberattacks on both social and technological levels. It doesn't mean that security and privacy improvements are blocking each other, they can and should be progressing in parallel, but understanding mutual dependencies is the key to the success for both.

Basic rules and fundamentals of security, are not that different from those twenty years ago. Memory attack vulnerabilities are still dominating, as most of the system-level software is still written in unsafe C and C derivatives. Browsers suffer from client-side attacks targeting rendering and JavaScript engines. The thing that changes the most is the pace of change due to automation and the rise of state-sponsored hacking groups targeting competitors and enemies in trade and hybrid cyber warfare.

AI-driven attackers are much more successful and automated than they used to be. AI-supported defenders also get new tools, and more advanced scanners at the source code, container, and runtime levels. However, the defense seems to be at a comparative disadvantage.

The fundamentals of security change slowly, which unfortunately does not mean they are perfectly implemented. Daily reports of data leaks typically comes down to the usual set of mishaps on the data owners and processing sites.

Data Needs to Be Protected

Decades-old strategies such as data minimization are still not a norm, as even simple transactions require users to provide too much information than is necessary to perform the transactions. The pressure to know and target customers better allow companies to get tons of telemetric data, bordering or crossing privacy violation borders of individuals and organizations.

Avoiding data copies is another recommendation that is true today and is not going away anytime soon. Unfortunately, data is copied unnecessarily which makes data retention policies much harder, and allows for a much larger data attack surface, without proper processes and tools. This also includes the rise of observability in distributed systems, which can create copies of sensitive data in the system logs that are hard to detect and remove.

Data retention conformance still relies too much on declarative statements than the physical destruction of data, for instance, already trained machine learning models make it almost impossible and it's a secret that everyone in the AI industry knows well. The models would have to be retrained with specific source data removed which is very costly and time-consuming. And that's on top of existing issues of backups and logs stored for years in digital archives.

Privacy of public LLM services has also been proven questionable, as uploaded corporate data containing business secrets as well as sensitive personal data are then used for model training. Free public services used by corporate users (instead o or besides corporate chatbots) often come with a hidden privacy "price," as the saying goes "if it appears to be free, you are the product."

Language models and machine learning models in general exhibit a memorization problem that leaks sensitive data with malicious prompting. Local Small Language Models (SLM) combined with Retrieval Augmented Generation (RAGs) are alternative that balances model performance with guarantees that no documents will be used to train global models. Another option is to rely on signed agreements with big tech companies and rely on their declarations of not using corporate data for model training.

Multi-device usage and bring-your-device (BYOD) trends mean that mobile applications requesting too many permissions to track users may contribute negatively to the privacy exposing data of employees, customers, and patients. There are corporate policies that reduce the exposure of corporate data, they need to be implemented correctly, however, devices do increase the attack surface and risks.

PET to the Rescue

Privacy Enhancing Technologies such as Differential Privacy (DP) are already mature enough to be used in real-world applications. They practically mean a slight deterioration of data usability but make it much harder to identify individuals. The tradeoff between privacy and data value should be considered every time there's a risk of data exposure, with a slight addition of controllable noise we can gain a much higher protection of data and machine learning models against membership inference attacks.

The federated learning strategy helps to train models without moving or accessing any sensitive data, avoiding data copy (and data retention) problems altogether. Data sharing agreements do not need to be signed, as there is no data sharing, of course, the operations performed must be non-disclosive, the models cannot be overtrained and assumed 100% private, so there's room for secure aggregation and differential privacy.

The space of PET is maturing fast, it's underestimated but it could dramatically improve privacy protection when combined with enterprise security and privacy-preserving mindset.

Confidential Computing

Another emerging technology is confidential computing which protects companies and their data against malicious administrations of hosting and cloud services. No one except people who are allowed from the company can access data at any time as it is always kept encrypted and the cloud provider does not have the keys. The technologies are improving fast, and there are already practical applications. The near-term future is expected to deliver on the promise of CPU and GPU accelerated workloads, very important for the entire machine learning field, including generative AI.

Future

The pressure on privacy put by the regulators is only going to increase. Fortunately, there's an entire ecosystem of strategies, technologies, and tools to help to minimize the risks without significantly affecting the IT budgets. Federated networks of (limited) trust are growing, privacy enhancing techniques deliver better results at a lower cost of data value. Confidential computing is improving fast and slowly gaining traction. In the times of generative AI news thrown at us daily it's easy to overlook the significant technological progress in this area of privacy protection due to technological advances. When combined with the right process and, most importantly, a privacy-preserving attitude of individuals and entire organizations, privacy can become a part of competitive advantage, significantly lowering risks of image and reputation damage and money loss due to regulation violations.

Jacek Chmiel is Director of Avenga Labs

Hot Topics

The Latest

Like most digital transformation shifts, organizations often prioritize productivity and leave security and observability to keep pace. This usually translates to both the mass implementation of new technology and fragmented monitoring and observability (M&O) tooling. In the era of AI and varied cloud architecture, a disparate observability function can be dangerous. IT teams will lack a complete picture of their IT environment, making it harder to diagnose issues while slowing down mean time to resolve (MTTR). In fact, according to recent data from the SolarWinds State of Monitoring & Observability Report, 77% of IT personnel said the lack of visibility across their on-prem and cloud architecture was an issue ...

In MEAN TIME TO INSIGHT Episode 23, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses the NetOps labor shortage ... 

Technology management is evolving, and in turn, so is the scope of FinOps. The FinOps Foundation recently updated their mission statement from "advancing the people who manage the value of cloud" to "advancing the people who manage the value of technology." This seemingly small change solidifies a larger evolution: FinOps practitioners have organically expanded to be focused on more than just cloud cost optimization. Today, FinOps teams are largely — and quickly — expanding their job descriptions, evolving into a critical function for managing the full value of technology ...

Enterprises are under pressure to scale AI quickly. Yet despite considerable investment, adoption continues to stall. One of the most overlooked reasons is vendor sprawl ... In reality, no organization deliberately sets out to create sprawling vendor ecosystems. More often, complexity accumulates over time through well-intentioned initiatives, such as enterprise-wide digital transformation efforts, point solutions, or decentralized sourcing strategies ...

Nearly every conversation about AI eventually circles back to compute. GPUs dominate the headlines while cloud platforms compete for workloads and model benchmarks drive investment decisions. But underneath that noise, a quieter infrastructure challenge is taking shape. The real bottleneck in enterprise AI is not processing power, it is the ability to store, manage and retrieve the relentless volumes of data that AI systems generate, consume and multiply ...

The 2026 Observability Survey from Grafana Labs paints a vivid picture of an industry maturing fast, where AI is welcomed with careful conditions, SaaS economics are reshaping spending decisions, complexity remains a defining challenge, and open standards continue to underpin it all ...

The observability industry has an evolving relationship with AI. We're not skeptics, but it's clear that trust in AI must be earned ... In Grafana Labs' annual Observability Survey, 92% said they see real value in AI surfacing anomalies before they cause downtime. Another 91% endorsed AI for forecasting and root cause analysis. So while the demand is there, customers need it to be trustworthy, as the survey also found that the practitioners most enthusiastic about AI are also the most insistent on explainability ...

In the modern enterprise, the conversation around AI has moved past skepticism toward a stage of active adoption. According to our 2026 State of IT Trends Report: The Human Side of Autonomous AI, nearly 90% of IT professionals view AI as a net positive, and this optimism is well-founded. We are seeing agentic AI move beyond simple automation to actively streamlining complex data insights and eliminating the manual toil that has long hindered innovation. However, as we integrate these autonomous agents into our ecosystems, the fundamental DNA of the IT role is evolving ...

AI workloads require an enormous amount of computing power ... What's also becoming abundantly clear is just how quickly AI's computing needs are leading to enterprise systems failure. According to Cockroach Labs' State of AI Infrastructure 2026 report, enterprise systems are much closer to failure than their organizations realize. The report ... suggests AI scale could cause widespread failures in as little as one year — making it a clear risk for business performance and reliability.

The quietest week your engineering team has ever had might also be its best. No alarms going off. No escalations. No frantic Teams or Slack threads at 2 a.m. Everything humming along exactly as it should. And somewhere in a leadership meeting, someone looks at the metrics dashboard, sees a flat line of incidents and says: "Seems like things are pretty calm over there. Do we really need all those people?" ... I've spent many years in engineering, and this pattern keeps repeating ...