Remove CTO Hire Remove Document Remove Fractional CTO Remove Information Security
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

VAMOSI: Once the classified documents were found online, there was an effort -- both by law enforcement and by the media -- to identify the leaker. It turns out some of the classified documents were photographed on a marble countertop, like in a kitchen countertop. That’s understandable, given his age. They could. And there were.

article thumbnail

7 key questions CIOs need to answer before committing to generative AI

CIO Business Intelligence

Then, when that didn’t work, it hired it’s own team to build the proprietary models it needed. But we sat down and fed it contracts and asked it nuanced questions about them: where are the liabilities, where are the risks,” he says. “But This is real meat and bones, tearing the contract apart, and it was 100% effective.