Skip to main content

The Role of Emerging Technologies in Enterprise Strategy

Jacek Chmiel
Avenga

Enterprise privacy is viewed more as a challenge and bottleneck in adopting AI and cloud API-driven projects than an opportunity to lower the risk of image and money loss thanks to novel technological solutions. There's a lot of focus on regulatory paperwork, and declarative formal privacy. Departments were created, roles were set, people were assigned, and privacy policies were written and published. Cookie warnings are implemented on corporate websites and mobile apps, etc. So from the basic regulatory obligations, all the requirements are met and fingers crossed that incoming regulations will not require too much additional effort.

However, behind the closed doors of decision-makers, real privacy protection thanks to technology and processes is often portrayed as too hard and too costly to implement. So the most common strategy is to do as little as possible just to conform to formal requirements of current and incoming regulations.

This is a missed opportunity because true privacy protection can be achieved with the right set of processes and technologies without killing the budget. The strategy of deprioritization and effort minimization unfortunately means that many technology teams are not even aware of available privacy protection options and progress in the field.

No Privacy without Security

First, there's no privacy without security, we need to connect both instead of separating them as issues because they are heavily interdependent. The security landscape is demanding more attention than ever, and getting more complex. We observe increased sophistication of cyberattacks on both social and technological levels. It doesn't mean that security and privacy improvements are blocking each other, they can and should be progressing in parallel, but understanding mutual dependencies is the key to the success for both.

Basic rules and fundamentals of security, are not that different from those twenty years ago. Memory attack vulnerabilities are still dominating, as most of the system-level software is still written in unsafe C and C derivatives. Browsers suffer from client-side attacks targeting rendering and JavaScript engines. The thing that changes the most is the pace of change due to automation and the rise of state-sponsored hacking groups targeting competitors and enemies in trade and hybrid cyber warfare.

AI-driven attackers are much more successful and automated than they used to be. AI-supported defenders also get new tools, and more advanced scanners at the source code, container, and runtime levels. However, the defense seems to be at a comparative disadvantage.

The fundamentals of security change slowly, which unfortunately does not mean they are perfectly implemented. Daily reports of data leaks typically comes down to the usual set of mishaps on the data owners and processing sites.

Data Needs to Be Protected

Decades-old strategies such as data minimization are still not a norm, as even simple transactions require users to provide too much information than is necessary to perform the transactions. The pressure to know and target customers better allow companies to get tons of telemetric data, bordering or crossing privacy violation borders of individuals and organizations.

Avoiding data copies is another recommendation that is true today and is not going away anytime soon. Unfortunately, data is copied unnecessarily which makes data retention policies much harder, and allows for a much larger data attack surface, without proper processes and tools. This also includes the rise of observability in distributed systems, which can create copies of sensitive data in the system logs that are hard to detect and remove.

Data retention conformance still relies too much on declarative statements than the physical destruction of data, for instance, already trained machine learning models make it almost impossible and it's a secret that everyone in the AI industry knows well. The models would have to be retrained with specific source data removed which is very costly and time-consuming. And that's on top of existing issues of backups and logs stored for years in digital archives.

Privacy of public LLM services has also been proven questionable, as uploaded corporate data containing business secrets as well as sensitive personal data are then used for model training. Free public services used by corporate users (instead o or besides corporate chatbots) often come with a hidden privacy "price," as the saying goes "if it appears to be free, you are the product."

Language models and machine learning models in general exhibit a memorization problem that leaks sensitive data with malicious prompting. Local Small Language Models (SLM) combined with Retrieval Augmented Generation (RAGs) are alternative that balances model performance with guarantees that no documents will be used to train global models. Another option is to rely on signed agreements with big tech companies and rely on their declarations of not using corporate data for model training.

Multi-device usage and bring-your-device (BYOD) trends mean that mobile applications requesting too many permissions to track users may contribute negatively to the privacy exposing data of employees, customers, and patients. There are corporate policies that reduce the exposure of corporate data, they need to be implemented correctly, however, devices do increase the attack surface and risks.

PET to the Rescue

Privacy Enhancing Technologies such as Differential Privacy (DP) are already mature enough to be used in real-world applications. They practically mean a slight deterioration of data usability but make it much harder to identify individuals. The tradeoff between privacy and data value should be considered every time there's a risk of data exposure, with a slight addition of controllable noise we can gain a much higher protection of data and machine learning models against membership inference attacks.

The federated learning strategy helps to train models without moving or accessing any sensitive data, avoiding data copy (and data retention) problems altogether. Data sharing agreements do not need to be signed, as there is no data sharing, of course, the operations performed must be non-disclosive, the models cannot be overtrained and assumed 100% private, so there's room for secure aggregation and differential privacy.

The space of PET is maturing fast, it's underestimated but it could dramatically improve privacy protection when combined with enterprise security and privacy-preserving mindset.

Confidential Computing

Another emerging technology is confidential computing which protects companies and their data against malicious administrations of hosting and cloud services. No one except people who are allowed from the company can access data at any time as it is always kept encrypted and the cloud provider does not have the keys. The technologies are improving fast, and there are already practical applications. The near-term future is expected to deliver on the promise of CPU and GPU accelerated workloads, very important for the entire machine learning field, including generative AI.

Future

The pressure on privacy put by the regulators is only going to increase. Fortunately, there's an entire ecosystem of strategies, technologies, and tools to help to minimize the risks without significantly affecting the IT budgets. Federated networks of (limited) trust are growing, privacy enhancing techniques deliver better results at a lower cost of data value. Confidential computing is improving fast and slowly gaining traction. In the times of generative AI news thrown at us daily it's easy to overlook the significant technological progress in this area of privacy protection due to technological advances. When combined with the right process and, most importantly, a privacy-preserving attitude of individuals and entire organizations, privacy can become a part of competitive advantage, significantly lowering risks of image and reputation damage and money loss due to regulation violations.

Jacek Chmiel is Director of Avenga Labs

Hot Topics

The Latest

AI is the catalyst for significant investment in data teams as enterprises require higher-quality data to power their AI applications, according to the State of Analytics Engineering Report from dbt Labs ...

Misaligned architecture can lead to business consequences, with 93% of respondents reporting negative outcomes such as service disruptions, high operational costs and security challenges ...

A Gartner analyst recently suggested that GenAI tools could create 25% time savings for network operational teams. Where might these time savings come from? How are GenAI tools helping NetOps teams today, and what other tasks might they take on in the future as models continue improving? In general, these savings come from automating or streamlining manual NetOps tasks ...

IT and line-of-business teams are increasingly aligned in their efforts to close the data gap and drive greater collaboration to alleviate IT bottlenecks and offload growing demands on IT teams, according to The 2025 Automation Benchmark Report: Insights from IT Leaders on Enterprise Automation & the Future of AI-Driven Businesses from Jitterbit ...

A large majority (86%) of data management and AI decision makers cite protecting data privacy as a top concern, with 76% of respondents citing ROI on data privacy and AI initiatives across their organization, according to a new Harris Poll from Collibra ...

According to Gartner, Inc. the following six trends will shape the future of cloud over the next four years, ultimately resulting in new ways of working that are digital in nature and transformative in impact ...

2020 was the equivalent of a wedding with a top-shelf open bar. As businesses scrambled to adjust to remote work, digital transformation accelerated at breakneck speed. New software categories emerged overnight. Tech stacks ballooned with all sorts of SaaS apps solving ALL the problems — often with little oversight or long-term integration planning, and yes frequently a lot of duplicated functionality ... But now the music's faded. The lights are on. Everyone from the CIO to the CFO is checking the bill. Welcome to the Great SaaS Hangover ...

Regardless of OpenShift being a scalable and flexible software, it can be a pain to monitor since complete visibility into the underlying operations is not guaranteed ... To effectively monitor an OpenShift environment, IT administrators should focus on these five key elements and their associated metrics ...

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

The Role of Emerging Technologies in Enterprise Strategy

Jacek Chmiel
Avenga

Enterprise privacy is viewed more as a challenge and bottleneck in adopting AI and cloud API-driven projects than an opportunity to lower the risk of image and money loss thanks to novel technological solutions. There's a lot of focus on regulatory paperwork, and declarative formal privacy. Departments were created, roles were set, people were assigned, and privacy policies were written and published. Cookie warnings are implemented on corporate websites and mobile apps, etc. So from the basic regulatory obligations, all the requirements are met and fingers crossed that incoming regulations will not require too much additional effort.

However, behind the closed doors of decision-makers, real privacy protection thanks to technology and processes is often portrayed as too hard and too costly to implement. So the most common strategy is to do as little as possible just to conform to formal requirements of current and incoming regulations.

This is a missed opportunity because true privacy protection can be achieved with the right set of processes and technologies without killing the budget. The strategy of deprioritization and effort minimization unfortunately means that many technology teams are not even aware of available privacy protection options and progress in the field.

No Privacy without Security

First, there's no privacy without security, we need to connect both instead of separating them as issues because they are heavily interdependent. The security landscape is demanding more attention than ever, and getting more complex. We observe increased sophistication of cyberattacks on both social and technological levels. It doesn't mean that security and privacy improvements are blocking each other, they can and should be progressing in parallel, but understanding mutual dependencies is the key to the success for both.

Basic rules and fundamentals of security, are not that different from those twenty years ago. Memory attack vulnerabilities are still dominating, as most of the system-level software is still written in unsafe C and C derivatives. Browsers suffer from client-side attacks targeting rendering and JavaScript engines. The thing that changes the most is the pace of change due to automation and the rise of state-sponsored hacking groups targeting competitors and enemies in trade and hybrid cyber warfare.

AI-driven attackers are much more successful and automated than they used to be. AI-supported defenders also get new tools, and more advanced scanners at the source code, container, and runtime levels. However, the defense seems to be at a comparative disadvantage.

The fundamentals of security change slowly, which unfortunately does not mean they are perfectly implemented. Daily reports of data leaks typically comes down to the usual set of mishaps on the data owners and processing sites.

Data Needs to Be Protected

Decades-old strategies such as data minimization are still not a norm, as even simple transactions require users to provide too much information than is necessary to perform the transactions. The pressure to know and target customers better allow companies to get tons of telemetric data, bordering or crossing privacy violation borders of individuals and organizations.

Avoiding data copies is another recommendation that is true today and is not going away anytime soon. Unfortunately, data is copied unnecessarily which makes data retention policies much harder, and allows for a much larger data attack surface, without proper processes and tools. This also includes the rise of observability in distributed systems, which can create copies of sensitive data in the system logs that are hard to detect and remove.

Data retention conformance still relies too much on declarative statements than the physical destruction of data, for instance, already trained machine learning models make it almost impossible and it's a secret that everyone in the AI industry knows well. The models would have to be retrained with specific source data removed which is very costly and time-consuming. And that's on top of existing issues of backups and logs stored for years in digital archives.

Privacy of public LLM services has also been proven questionable, as uploaded corporate data containing business secrets as well as sensitive personal data are then used for model training. Free public services used by corporate users (instead o or besides corporate chatbots) often come with a hidden privacy "price," as the saying goes "if it appears to be free, you are the product."

Language models and machine learning models in general exhibit a memorization problem that leaks sensitive data with malicious prompting. Local Small Language Models (SLM) combined with Retrieval Augmented Generation (RAGs) are alternative that balances model performance with guarantees that no documents will be used to train global models. Another option is to rely on signed agreements with big tech companies and rely on their declarations of not using corporate data for model training.

Multi-device usage and bring-your-device (BYOD) trends mean that mobile applications requesting too many permissions to track users may contribute negatively to the privacy exposing data of employees, customers, and patients. There are corporate policies that reduce the exposure of corporate data, they need to be implemented correctly, however, devices do increase the attack surface and risks.

PET to the Rescue

Privacy Enhancing Technologies such as Differential Privacy (DP) are already mature enough to be used in real-world applications. They practically mean a slight deterioration of data usability but make it much harder to identify individuals. The tradeoff between privacy and data value should be considered every time there's a risk of data exposure, with a slight addition of controllable noise we can gain a much higher protection of data and machine learning models against membership inference attacks.

The federated learning strategy helps to train models without moving or accessing any sensitive data, avoiding data copy (and data retention) problems altogether. Data sharing agreements do not need to be signed, as there is no data sharing, of course, the operations performed must be non-disclosive, the models cannot be overtrained and assumed 100% private, so there's room for secure aggregation and differential privacy.

The space of PET is maturing fast, it's underestimated but it could dramatically improve privacy protection when combined with enterprise security and privacy-preserving mindset.

Confidential Computing

Another emerging technology is confidential computing which protects companies and their data against malicious administrations of hosting and cloud services. No one except people who are allowed from the company can access data at any time as it is always kept encrypted and the cloud provider does not have the keys. The technologies are improving fast, and there are already practical applications. The near-term future is expected to deliver on the promise of CPU and GPU accelerated workloads, very important for the entire machine learning field, including generative AI.

Future

The pressure on privacy put by the regulators is only going to increase. Fortunately, there's an entire ecosystem of strategies, technologies, and tools to help to minimize the risks without significantly affecting the IT budgets. Federated networks of (limited) trust are growing, privacy enhancing techniques deliver better results at a lower cost of data value. Confidential computing is improving fast and slowly gaining traction. In the times of generative AI news thrown at us daily it's easy to overlook the significant technological progress in this area of privacy protection due to technological advances. When combined with the right process and, most importantly, a privacy-preserving attitude of individuals and entire organizations, privacy can become a part of competitive advantage, significantly lowering risks of image and reputation damage and money loss due to regulation violations.

Jacek Chmiel is Director of Avenga Labs

Hot Topics

The Latest

AI is the catalyst for significant investment in data teams as enterprises require higher-quality data to power their AI applications, according to the State of Analytics Engineering Report from dbt Labs ...

Misaligned architecture can lead to business consequences, with 93% of respondents reporting negative outcomes such as service disruptions, high operational costs and security challenges ...

A Gartner analyst recently suggested that GenAI tools could create 25% time savings for network operational teams. Where might these time savings come from? How are GenAI tools helping NetOps teams today, and what other tasks might they take on in the future as models continue improving? In general, these savings come from automating or streamlining manual NetOps tasks ...

IT and line-of-business teams are increasingly aligned in their efforts to close the data gap and drive greater collaboration to alleviate IT bottlenecks and offload growing demands on IT teams, according to The 2025 Automation Benchmark Report: Insights from IT Leaders on Enterprise Automation & the Future of AI-Driven Businesses from Jitterbit ...

A large majority (86%) of data management and AI decision makers cite protecting data privacy as a top concern, with 76% of respondents citing ROI on data privacy and AI initiatives across their organization, according to a new Harris Poll from Collibra ...

According to Gartner, Inc. the following six trends will shape the future of cloud over the next four years, ultimately resulting in new ways of working that are digital in nature and transformative in impact ...

2020 was the equivalent of a wedding with a top-shelf open bar. As businesses scrambled to adjust to remote work, digital transformation accelerated at breakneck speed. New software categories emerged overnight. Tech stacks ballooned with all sorts of SaaS apps solving ALL the problems — often with little oversight or long-term integration planning, and yes frequently a lot of duplicated functionality ... But now the music's faded. The lights are on. Everyone from the CIO to the CFO is checking the bill. Welcome to the Great SaaS Hangover ...

Regardless of OpenShift being a scalable and flexible software, it can be a pain to monitor since complete visibility into the underlying operations is not guaranteed ... To effectively monitor an OpenShift environment, IT administrators should focus on these five key elements and their associated metrics ...

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...