Remove Cloud Remove Security Remove Software Remove Symantec
article thumbnail

Implications of generative AI for enterprise security

CIO Business Intelligence

The cybersecurity challenges Generative AI, including ChatGPT, is primarily delivered through a software as a service (SaaS) model by third parties. It’s worth noting that this is very similar to software-as-a-service (SaaS) application problems as it can impact the response of future queries when used as a training set.

article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

Cloud computing provides businesses with quality solutions for their IT needs, as well as substantial cost savings over purchasing and maintaining their own hardware and software. Cloud services are generally pay-as-you-go solutions that offer flexibility and are scalable to business growth. Exposed Data Transfers.

Cloud 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Learn how agencies are turning to BYOD to ensure security and ROI. Steve Bennett , CEO, Symantec. Track D: Securing Your Infrastructure.

Symantec 261
article thumbnail

Symantec to Buy Security Software Firm Blue Coat for $4.65B

Data Center Knowledge

Blue Coat product suite can strengthen Symantec in areas of cloud data protection, digital forensics, management of encrypted network traffic Read More.

Symantec 100
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO Business Intelligence

Generative AI has taken the world seemingly by storm, impacting everything from software development, to marketing, to conversations with my kids at the dinner table. Protecting the Enterprise So, what can security professionals do to properly safeguard the use of Generative AI tools by their employees?

article thumbnail

A Disturbing Trend in Ransomware Attacks: Legitimate Software Abuse

CIO Business Intelligence

For example, the particularly heavy use of legitimate software tools in ransomware attack chains has been notable in recent times. In fact, we rarely see a ransomware attack that doesn’t use legitimate software. Ransomware actors, like threat actors in general, are abusing legitimate software for a number of reasons.

article thumbnail

Symantec Joins OpenStack Foundation as Gold Member

Data Center Knowledge

Security software firm has already been important contributor to open source cloud project Read More. Cloud Computing Security'

Symantec 188