article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO

Protecting data In a recent meeting I attended with over 100 security executives, the prevailing theme among participants was that the primary techniques used today to manage the safe use of AI in their organization were employee training and usage policies. Government oversight All the recent innovation has certainly caught the U.S.

article thumbnail

The Top Cloud Security Threat Comes from Within

CIO

Furthermore, when data and workloads reside on-premises, a firewall provides an extra layer of protection. So even when a setting gets misconfigured, there’s a lower chance of exposure outside the firewall. Misconfigured development settings are often the culprit in such scenarios. Ensure all systems have default credentials.

Cloud 355
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CRN 2020 Hottest Cybersecurity Products Include CN-Series Firewall

Palo Alto Networks

We’re proud to announce that CRN lists the CN-Series container firewall one of the hottest cybersecurity products of 2020. CN-Series is the industry’s first containerized Next-Generation Firewall (NGFW) designed specifically for Kubernetes environments and addresses growing container usage.

article thumbnail

A CISO POV: Securing AI in your company

CIO

Here are the key recommendations I provided: AI training implementation: Introduce AI training aligned with company policies and processes to empower employees with the necessary skills and awareness. How much of this usage is part of ‘approved and budgeted’ corporate policy and programs? The discussion around policies is a great one.

article thumbnail

Why Proxy-Based Firewalls Are Not Enough

Palo Alto Networks

Proxy-based firewalls or web proxies have been considered an essential security component for some time now, but the question remains: Can proxies really help keep users safe? The first proxy-based firewalls achieved the basic task of controlling which websites users could access on the Internet. Implementation. Effectiveness.

article thumbnail

Adapt to Change: Network Policy Change Management | The 5 Critical Success Factors to Agile NSPM

Firemon

To err is human, and with many enterprises managing 100 firewalls or more, there are plenty of chances for humans to err. Almost two out of every three businesses are still using manual firewall change management processes, despite ever-increasing volumes of change requests. The costs of managing firewalls are often hidden.

article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO

Employees are using it to develop software, write code, create content, and prepare sales and marketing plans. He also identified technologies to secure the AI engines and workflows used by the company (or its 3 rd party partners) that support creative content development. Here’s what I learned.