article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

Now, generative AI use has infiltrated the enterprise with tools and platforms like OpenAI’s ChatGPT / DALL-E, Anthropic’s Claude.ai, Stable Diffusion, and others in ways both expected and unexpected. Not all companies have security systems that can detect, block, or remediate this type of behavior.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Digital Risk Management Leader RiskIQ Raises New Funding To Expand Platform Ecosystem, Sales and Digital Risk Applications

CTOvision

Threats outside the firewall are vast and dynamic. RiskIQ provides organizations access to the widest range of security intelligence and applications necessary to understand exposures and take action - all without leaving the platform. To learn more about RiskIQ, visit www.riskiq.com.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Government. Register Now! Space is Limited.

Software 257
article thumbnail

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

Kevin: This time, however, I'd like to really talk to you about this security perimeter thing. Cloud mobility and the internet things have really obliterated what I've always referred to as the wall and moat security paradigm, where working inside the enterprise was safe but working outside of the company's walls wasn't.

article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

However, managing PCI security compliance across various lines of business within these institutions can be a complex and resource-intensive task. The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance.

Financial 105
article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO Business Intelligence

It was a difficult task, and the available talent pool was never enough. That difficulty in SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) still exists today. Artificial Intelligence, Data and Information Security, Security Caveat emptor!

Data 137