Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Risk of AI Model Collapse to Drive Zero Trust Data Governance
News

Risk of AI Model Collapse to Drive Zero Trust Data Governance

Team-CWDBy Team-CWDJanuary 24, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The proliferation of AI data, evolving regulatory requirements and risk of  large language model (LLM) collapse will help to drive take up of zero trust approaches to data governance in the next two years, Gartner has claimed.

The analyst firm warned that as books, code repositories, research papers and other sources start to feature more AI-generated content, future LLMs that scrape these sources will effectively be trained on outputs from previous models.

That in turn could hasten a decline in model quality and accuracy, and an increase in hallucinations and bias. In response to the surge in unverified AI data, as many as half of global organizations will turn to zero trust data governance, predicted Gartner.

Regulators will also increase their scrutiny in this area, the analyst claimed.

“As AI-generated content becomes more prevalent, regulatory requirements for verifying ‘AI-free’ data are expected to intensify in certain regions,” said Gartner managing VP, Wan Fui Chan.

“In this evolving regulatory environment, all organizations will need the ability to identify and tag AI-generated data. Success will depend on having the right tools and a workforce skilled in information and knowledge management, as well as metadata management solutions that are essential for data cataloging.” 

Read more on zero trust: NIST Publishes New Zero Trust Implementation Guidance.

This is where zero trust approaches to data governance could help.

Chan claimed that authentication and verification measures will soon become “essential to safeguard business and financial outcomes.” 

Differentiating on Metadata Management

According to Gartner, global organizations can get ahead of any forthcoming regulation on data governance and carve out competitive advantage by focusing on ways to analyze, alert and automate decision making across data assets. 

It suggested the following steps:

  • Appoint a dedicated AI governance leader to work closely with data and analytics (D&A) teams on zero trust policies, AI risk management and compliance
  • Form cross-functional teams from cybersecurity, data and analytics (D&A) and other parts of the business to carry out data risk assessments. These should help to identify business risks related to AI-generated data and determine which are addressed by existing policies and which will need new ones
  • Use existing D&A governance policies and frameworks, and update security, metadata management and ethics-related policies to address new risks from AI-generated data
  • Adopt active metadata practices which will alert in real time when data is stale or requires recertification. This will help organizations rapidly spot when business-critical systems might be exposed to inaccurate or biased data



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures
Next Article New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.