article thumbnail

What to Know About Enterprise Travel Security

SecureWorld News

Travel can involve significant security risks. These are the threats workers may face and what enterprises can do to protect them. These are the threats workers may face and what enterprises can do to protect them. The security risks business travelers may face. What effective travel policies can look like.

Travel 73
article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Weekly: Defense Department proposes new guidelines for developing AI technologies

Venture Beast

Defense Department's Defense Innovation Unit has proposed new ethics guidelines for private contractors developing AI systems. Read More.

article thumbnail

AI Weekly: UN recommendations point to need for AI ethics guidelines

Venture Beast

The United Nations' new AI ethics regulations point to growing recognition of the need for AI ethics guidelines. Read More.

article thumbnail

Securing the Final Frontier: NASA Space Security Best Practices Guide

SecureWorld News

It released the Space Security: Best Practices Guide (BPG) , a landmark document designed to safeguard every satellite, communication, and mission from the lurking threats of the digital unknown. Mitigating Risks, Not Replacing Requirements: The BPG acts as a supplementary tool, not a replacement for existing security standards.

article thumbnail

Enterprises enthusiastic about generative AI, Foundry survey shows

CIO Business Intelligence

Generative AI is already making deep inroads into the enterprise, but not always under IT department control, according to a recent survey of business and IT leaders by Foundry, publisher of CIO.com. Enterprises with 5,000 or more employees were more likely (69%) to be trying the technology than smaller ones (57%).

Survey 98
article thumbnail

Transmission of Sensitive Data Policy

Tech Republic Security

Data stored inside a securely monitored environment is much less likely to fall into the wrong hands than data exchanged between people and systems. With this in mind, it is essential for company personnel to adhere to firm and clear guidelines. Data in transit means data is at risk if the proper precautions aren’t followed.

Policies 131