article thumbnail

Generative AI: Balancing security with innovation

CIO Business Intelligence

Whether it’s deep fakes or simply more sophisticated phishing attempts, AI is making it easier to steal identities and ramping up the need for more accurate, faster authentication. Visit Discover Technology to learn more about Discover’s approach to security, AI, reliability and more. Misinformation and manipulation of data.

article thumbnail

Trusted Cyber Collaboration Workshop: A gathering of the leaders in secure collaboration and cyber security 24-26 Sep in DC

CTOvision

TSCP is proud to present the Trusted Cyber Collaboration Workshop, an opportunity for professional information sharing, and a vendor exhibition. Please take a moment to review the growing speaker roster below–you’ll find over two dozen leaders in secure collaboration, and all of them will be speaking this Fall.

Security 258
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

My CISM Journey - The True Value of Certifications

CIO Musings

I have worked in cyber security for decades. I have toiled in the trenches, built authentication systems, lived through breaches, sold infosec investments to budget-minded leaders, built cyber security teams, and most importantly led in the cybersecurity area. As they say it is the journey, not the event. Piece of cake.

Study 195
article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In recent months, you may have noticed an uptick in two-factor and multi-factor authentication prompts, which are being used to verify consumer and business accounts. Implementing multi-factor authentication. Some companies use physical security keys for an additional layer of data protection.

article thumbnail

Spotlight on Cybersecurity Leaders: Randy Raw

SecureWorld News

In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. He is the Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He is the Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

5G FWA and security 5G networks can provide secure networking because it has additional attributes such as separation of keys, backward and forward security for keys at handovers, idle mode mobility and secure algorithm negotiation.

article thumbnail

MongoDB data breach: Will there be a compensation?

Dataconomy

The recent MongoDB data breach is a significant event where MongoDB’s corporate systems were compromised, leading to the exposure of customer data. Recognizing this, MongoDB has advised all customers to enhance their account security. Verify the authenticity of any emails or messages claiming to be from MongoDB.

Data 41