article thumbnail

A CISO POV: Securing AI in your company

CIO Business Intelligence

Here are the key recommendations I provided: AI training implementation: Introduce AI training aligned with company policies and processes to empower employees with the necessary skills and awareness. I’ve heard of companies creating a separate set of policies for every transformative technology.

Company 73
article thumbnail

Fed Tech Roundup August 27

CTOvision

Second Australian Company to Provide Parts for Initial Production of the Triton Unmanned Aircraft System. Symantec takes on the Internet of unsecured things - GCN.com. Prioritizing authentication, GitHub attacked, Carter back to Silicon Valley. Navy To Give Out New 'Innovation Award' - Nextgov.

Symantec 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

All information traveling between your company network and the servers of your cloud provider exists, if only briefly at times, on the internet, where it could possibly be captured by malicious computers. Public perceptions of high risk could create severe problems for companies. Exposed Data Transfers. Data Breaches.

Cloud 150
article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Customers can also operate with confidence as a result of our actions in software, such as our migration of Symantec Web Security Service and Cloud Access Security Broker onto Google Cloud.

Vmware 97
article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. Zero Trust isn’t what you might think. That’s false advertising.

article thumbnail

A Question of Identity: The Evolution of Identity & Access Management

SecureWorld News

Ninety-five percent of cybersecurity breaches are due to human error (Symantec Internet Security Threat Report). CISOs must now envision and enact holistic supply chain identity strategies for provisioning identities to individuals, systems, and IoT devices outside of but connected to the company. Establish an IoT identity lifecycle.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

After breaches like SolarWinds, companies pledge to improve their digital hygiene. CareFusion’s parent company Becton Dickinson responded, saying that all 14 hundred and 18 of the identified vulnerabilities were within third-party software applications including Windows XP and Symantec pcAnywhere, and others.