Remove Firewall Remove Information Security Remove Security Remove Survey
article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

He also identified technologies to secure the AI engines and workflows used by the company (or its 3 rd party partners) that support creative content development. Not all companies have security systems that can detect, block, or remediate this type of behavior. What followed was a knee-jerk reaction to ban ChatGPT.

article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are we doing about it?

Airlines 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CIOs Know That The Biggest Threats Come From Inside

The Accidental Successful CIO

As the person with the CIO job, one of the things that takes up a lot of your time is trying to keep the company’s valuable data and knowledge safe because you understand the importance of information technology. However, in the end, it just might turn out that your greatest threat doesn’t come from the outside. Know Your Threats.

Financial 130
article thumbnail

Hardest tech roles to fill (+ solutions!)

Hacker Earth

A survey of 42,300 employers across 43 countries and territories found that the demand for IT skills has skyrocketed. Companies are facing security breaches at an alarming rate, putting every web user’s data at risk. Cybersecurity professionals are trained to find loopholes in databases, networks, hardware, firewalls, and encryption.

article thumbnail

A new era of Enterprise Content Management (ECM)

CTOvision

Faced with the demands for process management, enterprise search, access beyond the firewall, mobile device support, social interaction, and cloud deployment, enterprises have been sold add-on modules and product integrations to enable wall-to-wall content management across the enterprise and outside its walls. The re-birth of ECM.

article thumbnail

Hardest tech roles to fill (+ solutions!)

Hacker Earth

A survey of 42,300 employers across 43 countries and territories found that the demand for IT skills has skyrocketed. Companies are facing security breaches at an alarming rate, putting every web user’s data at risk. Cybersecurity professionals are trained to find loopholes in databases, networks, hardware, firewalls, and encryption.