Saturday, 14 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > AI will likely shut down critical infrastructure on its own, no attackers required
Global Market

AI will likely shut down critical infrastructure on its own, no attackers required

Last updated: February 14, 2026 8:32 am
Published February 14, 2026
Share
AI-driven technology powers automation and big data workflows, enabling analysis through neural networks and data analytics for business intelligence, predictive insights, and process optimization.
SHARE

Thus, he mentioned, corporations ought to arrange a enterprise danger program with a governing physique that defines and manages these dangers, monitoring AI for habits adjustments.

Reframe how AI is managed

Sanchit Vir Gogia, chief analyst at Greyhound Analysis, mentioned addressing this downside requires executives to first reframe the structural questions. 

“Most enterprises nonetheless speak about AI inside operational environments as if it have been an analytics layer, one thing intelligent sitting on prime of infrastructure. That framing is already outdated,” he mentioned. “The second an AI system influences a bodily course of, even not directly, it stops being an analytics instrument, it turns into a part of the management system. And as soon as it turns into a part of the management system, it inherits the obligations of security engineering.”

He famous that the implications of misconfiguration in cyber bodily environments differ from these in conventional IT estates, the place outages or instability could consequence.

“In cyber bodily environments, misconfiguration interacts with physics. A badly tuned threshold in a predictive mannequin, a configuration tweak that alters sensitivity to anomaly detection, a smoothing algorithm that unintentionally filters weak indicators, or a quiet shift in telemetry scaling can all change how the system behaves,” he mentioned. “Not catastrophically at first. Subtly. And in tightly coupled infrastructure, refined is commonly how cascade begins.”

He added: “Organizations ought to require specific articulation of worst-case behavioral eventualities for each AI-enabled operational part. If demand indicators are misinterpreted, what occurs? If telemetry shifts step by step, how does sensitivity change? If thresholds are misaligned, what boundary situation prevents runaway habits? When groups can not reply these questions clearly, governance maturity is incomplete.”

See also  Cisco launches AI infrastructure, AI practitioner certifications

Source link

TAGGED: attackers, Critical, infrastructure, required, shut
Share This Article
Twitter Email Copy Link Print
Previous Article What Murder Mystery 2 reveals about emergent behaviour in online games What Murder Mystery 2 reveals about emergent behaviour in online games
Next Article Wesfarmers turns to Google Cloud to scale AI across its retail brands Wesfarmers scales AI across retail brands with Google Cloud
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Arista targets lateral security threat in campus and data center networks

Along with the stateless wire-speed element, Arista MSS can combine with firewalls and cloud proxies…

May 1, 2024

Nvidia Showcases Inference Chops with Rubin CPX Preview

Nvidia on Tuesday touted inference advantages of its new and deliberate GPU releases, as the…

September 24, 2025

12 principles for improving devsecops

I as soon as transitioned from a SaaS CTO function to turn into a enterprise…

May 22, 2024

Airedale delivers 36 fan air cooled chillers

The vast order, for an undisclosed data center operator, is believed to be one of…

January 30, 2024

LG EXAONE Deep is a maths, science, and coding buff

LG AI Analysis has unveiled EXAONE Deep, a reasoning mannequin that excels in complicated problem-solving…

March 18, 2025

You Might Also Like

Auckland / New Zealand - November 7 2019: View of Microsoft office building
Global Market

FTC digs deeper into Microsoft’s bundling and licensing practices

By saad
The internet’s next upgrade should be cleaner
Global Market

The internet’s next upgrade should be cleaner

By saad
80 MW Blackpool data centre wins planning approval
Global Market

80 MW Blackpool data centre wins planning approval

By saad
digital infrastructure
Innovations

The hidden networks behind Europe’s digital infrastructure

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.