article thumbnail

Cognitio and ThreatBrief in People Magazine: Security tips for the general public

CTOvision

Media can and should also play a role, which is one reason I was very glad to have a chance to discuss cyber security with People Magazine in a story titled " Keep Your Email Secure: Experts on How to Avoid the Hacks That Impacted Colin Powell and Hillary Clinton. " Don’t use free email from your ISP. Use Google mail.

Security 150
article thumbnail

14 essential book recommendations by and for IT leaders

CIO Business Intelligence

For grasping artificial intelligence Sherry Comes, former CTO at IBM Watson and current managing director of conversational AI at PwC, thinks you need to read Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers (Wiley, 2022) by Robb Wilson. CTO and co-founder of Digibee.

Devops 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Storytelling for CIOs: From niche to bestseller

CIO Business Intelligence

“I take what I learned in the scriptwriting seminar about passion and the narrative arc into every meeting I attend,” one chief technology officer said. Miguel Traquina, CIO of biometric authentication company iProov, agrees. Why tell stories? That’s what data storytelling is: visualisation plus narrative plus context.”

article thumbnail

Technology News and Hot Topics

CTOvision

— dominated Big Data news this week, while the third, MapR Technologies Inc., Read more on ADT Magazine. Cloudera CTO on Big Data analytics and security risks. Upgrades of enterprise Hadoop-based distributions from two of the top three vendors — Cloudera Inc. and Hortonworks Inc.

Dell 258
article thumbnail

Safeguarding Ethical Development in ChatGPT and Other LLMs

SecureWorld News

Adopting a security-by-design approach helps to embed robust security measures into the very fabric of technology, fortifying it against threats and vulnerabilities. Alternatively, you may wish to develop a custom content filtration system tailored to specific use cases."

article thumbnail

If You Drive A Car, Or Know Someone Who Does, You Must Read This…

CTOvision

Thanks to the professional, virtuous work of security researchers Chris Valasek and Charlie Miller and some fantastic reporting on this research by Andy Greenberg of Wired Magazine , we have long known that theoretical hacks against cars are no longer theoretical. They are real. Ensure your vehicle software is up to date.

Software 150
article thumbnail

The Ballad of Bull Cook, A Wacky Book

Crafty CTO

A Book Encounter While browsing the lake house bookshelves, John stumbled across Bull Cook and Authentic Historical Recipes and Practices and was immediately hooked. This is the first time the real authentic recipe for corning meat has ever been published.