{"id":141291,"date":"2025-09-08T08:49:13","date_gmt":"2025-09-08T08:49:13","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/141291\/"},"modified":"2025-09-08T08:49:13","modified_gmt":"2025-09-08T08:49:13","slug":"the-importance-of-reviewing-ai-data-centers-policies","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/141291\/","title":{"rendered":"The importance of reviewing AI data centers\u2019 policies"},"content":{"rendered":"<p>Like traditional data centers, AI data centers contain hardware, network, storage, data, and software components, making them targets of common cyberattacks: <a href=\"https:\/\/www.csoonline.com\/article\/571981\/ddos-attacks-definition-examples-and-techniques.html\" rel=\"nofollow noopener\" target=\"_blank\">distributed denial of service (DDoS),<\/a> <a href=\"https:\/\/www.csoonline.com\/article\/563507\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\" rel=\"nofollow noopener\" target=\"_blank\">ransomware<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/570743\/6-most-common-types-of-software-supply-chain-attacks-explained.html\" rel=\"nofollow noopener\" target=\"_blank\">supply chain<\/a>, and <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/social_engineering\" rel=\"nofollow noopener\" target=\"_blank\">social engineering<\/a> attacks. Data centers are also notorious for being vulnerable to side-channel attacks \u2013 a cyberattack that collects information on or tries to influence a system\u2019s processes and execution \u2013 because data center hardware, from fans to central processing units (CPUs), can reveal sensitive information about CPU-level activity, data architecture and usage. For example, in July 2025, <a href=\"https:\/\/www.csoonline.com\/article\/4020192\/amd-discloses-new-cpu-flaws-that-can-enable-data-leaks-via-timing-attacks.html\" rel=\"nofollow noopener\" target=\"_blank\">AMD<\/a> found four new processor vulnerabilities that would allow side-channel attacks.<\/p>\n<p>The risks AI data centers face<\/p>\n<p>Compared to traditional ones, though, AI data centers face an expanded set of threats due to the differences in hardware, data and purpose.<\/p>\n<p>While large data centers use CPUs and graphics processing units (GPUs), AI data centers always use GPUs because AI workloads require more compute power and because GPUs allow for parallel operations. Application-specific integrated circuits (ASICs) and field-programmable gate arrays (FPGAs) are also powerful <a href=\"https:\/\/www.trgdatacenters.com\/resource\/how-are-ai-data-centers-changing-infrastructure\/\" rel=\"nofollow noopener\" target=\"_blank\">hardware<\/a> that can be customized to efficiently compute and process AI workloads. Google invented an ASIC specific for AI and deep learning called the <a href=\"https:\/\/cloud.google.com\/tpu\" rel=\"nofollow noopener\" target=\"_blank\">Tensor Processing Unit (TPU)<\/a>. These more powerful resources are vulnerable to side-channel attacks just like CPUs: in January 2025, <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/tpuxtract-attackers-steal-ai-models\" rel=\"nofollow noopener\" target=\"_blank\">TPUXtract<\/a>, a TPU-specific side-channel attack that exploits data leaks and allows threat actors to infer an AI model\u2019s parameters, was discovered.<\/p>\n","protected":false},"excerpt":{"rendered":"Like traditional data centers, AI data centers contain hardware, network, storage, data, and software components, making them targets&hellip;\n","protected":false},"author":2,"featured_media":141292,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[182,181,507,74],"class_list":{"0":"post-141291","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-artificial-intelligence","8":"tag-ai","9":"tag-artificial-intelligence","10":"tag-artificialintelligence","11":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/141291","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=141291"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/141291\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/141292"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=141291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=141291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=141291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}