article thumbnail

Generative AI: Balancing security with innovation

CIO Business Intelligence

While we can’t plan for every new threat that AI poses, it’s imperative to have the right AI usage guardrails in place at Discover® Financial Services and know how to quickly address any vulnerabilities. Visit Discover Technology to learn more about Discover’s approach to security, AI, reliability and more.

article thumbnail

Steps CIOs should take to protect customer data in Nigeria’s open banking systems

CIO Business Intelligence

The Operational Guidelines for Open Banking in Nigeria published by the CBN stress that customer data security is critical for the safety of the open banking model. The preliminary draft will guide the industry discussion before the final guidelines are put in place by the end of the year.

Banking 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO Business Intelligence

And that’s why in October, the White House issued its guidelines on regulating AI in government agencies. Right now, it does not involve policing the networks and the information, but rather, it’s a watching, learning, and monitoring process, helping the security team make better decisions on how to safely use LLMs.

article thumbnail

The Importance of an Online Encryption Policy

CTOvision

Though you may have the best IT department in the world and advanced computing resources, if there are no written methodical steps that will serve as guidelines or Standard Operating Procedure (SOP) for computing and data storage, then all these hiring-sprees of IT talents and investments are doomed to fail.

Policies 283
article thumbnail

Be safe inside your cyber fortress

Dataconomy

Cybersecurity standards and frameworks provide a structured approach to safeguarding digital assets, establishing effective security controls, and ensuring compliance with relevant regulations. These standards serve as guidelines, best practices, and benchmarks that organizations can adopt to enhance their cybersecurity posture.

article thumbnail

The 7 Step to Develop and Deploy Data Loss Prevention Strategy

Galido

This chart provides general guidelines that your DLP strategy should follow, bear in mind that there are a number of fundamental activities that must occur when initiating a data loss prevention program. DLP is simpler to implement and manage, and if implemented properly it will also provide lessons on how to expand the program.

article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

Prepare containment and mitigation strategies and guidelines for events during (or after) an attack. Share data knowledge and security alerts with other businesses and government/cyber security communities to help others become more aware of potential threats and how to best mitigate these potentially damaging events.