Remove Authentication Remove Generative AI Remove Security Remove Strategy
article thumbnail

Generative AI: Balancing security with innovation

CIO

The speed at which artificial intelligence (AI)—and particularly generative AI (GenAI)—is upending everyday life and entire industries is staggering. AI threats to fintech companies When I think about possible AI threats, top of mind to me is how AI can be weaponized: Threats to identity.

article thumbnail

20 issues shaping generative AI strategies today

CIO

Organizations are rushing to figure out how to extract business value from generative AI — without falling prey to the myriad pitfalls arising. They note, too, that CIOs — being top technologists within their organizations — will be running point on those concerns as companies establish their gen AI strategies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

TechCrunch+ roundup: Generative AI for proptech, cloud vendor shopping, cybersecurity fairy tales

TechCrunch

Generative AI reminds me of ball bearings: the technology is relatively inexpensive, highly adaptable and a proven way to reduce friction. Investors have taken notice: CB Insights reports that VCs poured $49 billion into AI last year, a 40% jump from the year before. ” It may sound authentic, but David J. .”

article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO

Security and risk management pros have a lot keeping them up at night. The era of AI deepfakes is fully upon us, and unfortunately, today’s identity verification and security methods won’t survive. First, you’ll need to understand exactly how bad actors use AI deepfakes to attack your systems.

article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Adversaries continue to innovate.

Trends 299
article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

Many customers are looking for guidance on how to manage security, privacy, and compliance as they develop generative AI applications. This post provides three guided steps to architect risk management strategies while developing generative AI applications using LLMs.

article thumbnail

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Tenable

Check out the NSA’s 10 key best practices for securing cloud environments. Plus, learn how cloud native computing could help streamline your AI deployments. Meanwhile, don’t miss the latest about cyberthreats against water treatment plants and critical infrastructure in general. Employ secure cloud key-management practices.