article thumbnail

Generative AI: Balancing security with innovation

CIO Business Intelligence

Additionally, related issues during use are risk of hallucinations and prompt engineering. Conclusion As the Chief Information Security Officer (CISO) at Discover, I am both excited and sober about how generative AI will change the fintech landscape in the coming years. Exploiting technology vulnerabilities.

article thumbnail

Here’s who Apple and Epic are calling to testify in next week’s trial

The Verge

Craig Federighi, senior vice president, software engineering — covering “iOS operating system; competition faced by Apple; Apple’s investment and efforts to combat malware, spyware, and other issues relating to app security and iOS device user protection.” Scheduled for one hour examination, 30 minutes cross examination.).

Apple 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In the T-Mobile case, Lapsus$ members hacked into T-Mobile’s network in March 2022 by compromising employee accounts, either via phishing or another form of social engineering. Another recent breach took advantage of a company’s sales team via social engineering. Cyberattacks, Data and Information Security, Risk Management

article thumbnail

Top Certifications in Cybersecurity and How they Can Advance Your Career

SecureWorld News

As organizations across industries grapple with escalating cyber risks, the demand for skilled information security professionals has skyrocketed. Each provider may have its pricing guidelines and policies. Certification provider: Different certification providers may have their own pricing structures.

Study 59
article thumbnail

Jio showcases enablement of secure IoT over Blockchain platform

TM Forum

IoT device companies can conduct conformance testing of devices for particular use cases, which is essential in hardware engineering design for the manufacturing and assembly (DFMA) cycle. They can configure a Blockchain network to meet their requirements and information security guidelines.

Security 130
article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . Intelligence Community.

article thumbnail

IT leaders grapple with shadow AI

CIO Business Intelligence

Engineers can also call upon generative AI to come up with possible solutions to customer demands, such as reducing the physical footprint of a circuit board by replacing certain components in the bill of materials, while shortening the go-to-market lead time. IDC Data and Information Security, Generative AI, IT Governance, IT Strategy