Remove Enterprise Remove Firewall Remove Information Security Remove Security
article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

Now, generative AI use has infiltrated the enterprise with tools and platforms like OpenAI’s ChatGPT / DALL-E, Anthropic’s Claude.ai, Stable Diffusion, and others in ways both expected and unexpected. Not all companies have security systems that can detect, block, or remediate this type of behavior.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

Gartner projects that spending on information security and risk management products and services will grow 11.3% To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

Security 109
article thumbnail

Digital Risk Management Leader RiskIQ Raises New Funding To Expand Platform Ecosystem, Sales and Digital Risk Applications

CTOvision

Threats outside the firewall are vast and dynamic. RiskIQ provides organizations access to the widest range of security intelligence and applications necessary to understand exposures and take action - all without leaving the platform. We are pleased to have Georgian Partners as part of our strong investment and advisory team. "Our

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

This forces IT and information security specialists to constantly enhance protection to effectively counter information security incidents related to malware distribution through rogue websites, links, and email attachments. Provides more security: Remote browser isolation in the cloud is very reliable.

article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Government. Register Now! Space is Limited.

Software 257
article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO Business Intelligence

This time they’re making a $13 billion bet by partnering with OpenAI and bringing to market new products like Security Copilot to make sense of the threat landscape using the recently launched text-generating GPT-4 (more on that below). Now, Microsoft is putting a stake in the ground with its generative AI Security Copilot tool.

Data 133