article thumbnail

Managing the whole lifecycle for human and machine authentication

CIO Business Intelligence

In my last column for CIO.com , I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. . Didn’t the FIDO Alliance just recently announce new UX guidelines to speed up MFA adoption with FIDO security keys?” Well, yes, but there is more that tech pros can do.

article thumbnail

8 tips for cultivating a winning IT culture

CIO Business Intelligence

Be authentic A winning IT culture requires an authentic IT leader , says Jay Upchurch, executive vice president and CIO at business software firm SAS. For some people, authenticity can be uncomfortable because it requires transparency and vulnerability,” he warns. Yet authenticity draws employees in and builds trust.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How the new AI executive order stacks up: B-

CIO Business Intelligence

AI security While it is refreshing to see the specificity in a handful of elements, such as the Department of Commerce’s development of guidance for content authentication and watermarking to label AI-generated content clearly, many security goals remain open to interpretation.

article thumbnail

Generative AI: Balancing security with innovation

CIO Business Intelligence

Whether it’s deep fakes or simply more sophisticated phishing attempts, AI is making it easier to steal identities and ramping up the need for more accurate, faster authentication. AI threats to fintech companies When I think about possible AI threats, top of mind to me is how AI can be weaponized: Threats to identity.

article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In recent months, you may have noticed an uptick in two-factor and multi-factor authentication prompts, which are being used to verify consumer and business accounts. These tools are gaining more traction to help consumers and businesses protect against identity fraud, data breaches, password skimming, and phishing/ransomware attacks.

article thumbnail

Chief AI officers in demand as IT leaders expect gen AI productivity boost, survey finds

CIO Business Intelligence

Organizations are preparing for the arrival of generative AI in a number of ways, with 57% of respondents saying they are already identifying use cases, 45% starting pilot programs, 41% training or upskilling employees on it, 40% establishing policies and guidelines. Software vendors have been busy infusing generative AI into their products.

Survey 132
article thumbnail

20 issues shaping generative AI strategies today

CIO Business Intelligence

The risk guidelines for gen AI are fragile and new, and there’s no commonly accepted ‘Here’s how to think about risk guardrails.’ Compliance with data protection laws, intellectual property regulations, industry-specific guidelines, and ethical standards is crucial. There will be eventually, but they don’t exist yet.”