Remove Authentication Remove Compliance Remove Generative AI Remove Security
article thumbnail

Generative AI: Balancing security with innovation

CIO

The speed at which artificial intelligence (AI)—and particularly generative AI (GenAI)—is upending everyday life and entire industries is staggering. AI threats to fintech companies When I think about possible AI threats, top of mind to me is how AI can be weaponized: Threats to identity.

article thumbnail

A secure approach to generative AI with AWS

AWS Machine Learning - AI

Generative artificial intelligence (AI) is transforming the customer experience in industries across the globe. They’re often used with highly sensitive business data, like personal data, compliance data, operational data, and financial information, to optimize the model’s output.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

20 issues shaping generative AI strategies today

CIO

Organizations are rushing to figure out how to extract business value from generative AI — without falling prey to the myriad pitfalls arising. They note, too, that CIOs — being top technologists within their organizations — will be running point on those concerns as companies establish their gen AI strategies.

article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

Many customers are looking for guidance on how to manage security, privacy, and compliance as they develop generative AI applications. This post provides three guided steps to architect risk management strategies while developing generative AI applications using LLMs.

article thumbnail

Cybersecurity Snapshot: 6 Best Practices for Implementing AI Securely and Ethically

Tenable

Like many organizations, yours is likely using AI – or at least thinking about deploying it soon. But how can you ensure you use it securely, responsibly, ethically and in compliance with regulations? Check out best practices, guidelines and tips in this special edition of the Tenable Cybersecurity Snapshot!

article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Cybersecurity budgets are typically caught between these two forces.

Trends 275
article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Plus, a new survey shows cybersecurity pros are guardedly optimistic about AI. And the NSA is sharing best practices for data security. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week. And much more!