article thumbnail

IDG Contributor Network: 3 new information security jobs for the digital enterprise

Network World

The responsibilities of information security are rapidly changing as enterprises digitize. Digitization has spurred three company-wide shifts, creating the need for three associated new information security roles. Information security increasingly plays a larger role in advising business partners on strategy.

article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fortress Information Security receives $125M to find the answer to supply chain attacks

Venture Beast

To date, Fortress’ platform includes a range of tools and features to help enterprises automate supply chain management. Read More.

article thumbnail

Four ways CISOs can move enterprise security into the new normal

Tech Republic Data Center

Security is changing rapidly, and the COVID-19 pandemic hasn't helped. A Cisco roundtable of chief information security officer advisers plotted the course for a secure future.

Security 209
article thumbnail

It's time to secure the Apple enterprise

Computerworld Vertical IT

That means every business or personal computer user should audit their existing security protections, particularly for companies that have embraced the hybrid workplace.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

Now, generative AI use has infiltrated the enterprise with tools and platforms like OpenAI’s ChatGPT / DALL-E, Anthropic’s Claude.ai, Stable Diffusion, and others in ways both expected and unexpected. Not all companies have security systems that can detect, block, or remediate this type of behavior. Stay tuned!

article thumbnail

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

CTOvision

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. By Bob Gourley.