Remove Development Remove Policies Remove Security Remove Technical Advisors
article thumbnail

DOJ hires first chief AI officer to examine internal and external uses

CIO

Jonathan Mayer, a well-known computer science and public policy professor at Princeton University, will serve as both the DOJ’s chief AI officer and as its chief science and technology officer. Mayer will help the DOJ be “prepared for both the challenges and opportunities that new technologies present,” Garland said in a statement.

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? If so, you might want to check out a new guide published this week about how businesses can use AI securely.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 barriers to strategic IT success

CIO

When asked which challenges most often force IT to redirect time and focus away from strategy and innovation tasks, CIOs most commonly cited staff and skills shortages, changing business conditions, and addressing security threats. Tech debt and legacy tech Technical debt and legacy tech are both big speedbumps. 1 challenge listed.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. 1 - Multinational cyber agencies issue best practices for secure AI deployment Looking for best practices on how to securely deploy artificial intelligence (AI) systems? And don’t miss the latest CIS Benchmarks updates.

article thumbnail

Cybersecurity Snapshot: New Guide Explains How To Assess If Software Is Secure by Design, While NIST Publishes GenAI Risk Framework

Tenable

Is the software your company wants to buy securely designed? 1 - How to assess if a tech product is secure by design Buying a securely designed digital product can lower your risk of breaches, simplify cyber defense efforts and reduce costs. A new guide outlines how you can find out. And much more!

article thumbnail

6 IT rules worth breaking — and how to get away with it

CIO

Here’s a rundown of six IT policies or protocols that, in certain situations, with certain guardrails in place, can be disregarded in order to perform what needs to get done. Potential risks to consider include system downtime, workflow disruptions, or even security vulnerabilities if the cancellation isn’t managed intelligently.

article thumbnail

CIOs Have To Find Ways To Deal With New Cybersecurity Rules

The Accidental Successful CIO

CIOs deal with changing rules regarding cybersecurity Image Credit: Stock Catalog As though CIOs didn’t already have enough to deal with, it turns out that the rules are changing on us. Cybersecurity has always been a big deal for our firms; however, the U.S. government is starting to understand just how big of a deal it is.