article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO

Protecting data In a recent meeting I attended with over 100 security executives, the prevailing theme among participants was that the primary techniques used today to manage the safe use of AI in their organization were employee training and usage policies. So, simply blocking LLM access is not the right answer. government’s attention.

article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

And more specifically, how do CIOs, CSOs, and cybersecurity teams learn to deal with technology that may pose serious security and privacy risks? The good, the bad, and the scary I look at the good, the bad, and the scary of this recent Microsoft announcement. It’s versatile, easy to use, and usually produces solid results.

Security 342
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OpenAI connects ChatGPT to the internet

TechCrunch

Available in alpha to ChatGPT users and developers on the waitlist , OpenAI says that it’ll initially prioritize a small number of developers and subscribers to its premium ChatGPT Plus plan before rolling out larger-scale and API access. At the same time, the algorithmic approach to search opens the door to bad actors.

ChatGPT 335
article thumbnail

Do Your SOC Metrics Incentivize Bad Behavior?

Palo Alto Networks

Some metrics that security operations centers (SOCs) widely use to evaluate their performance have the potential to drive poor behavior. Another poor metric is counting the number of firewall rules deployed. 10,000 firewall rules can be in place, but if the first bypasses the rest (e.g., Download a free copy today.

article thumbnail

SASE success: Avoid confusion and embrace a single-vendor solution

CIO

The industry quickly realized this approach created a lot of complexity because it required IT teams to procure, deploy, and manage disparate solutions that often didn’t work well together. Since they don’t need to connect and manage a bunch of products, IT teams can focus on driving additional business outcomes. 5 I agree.

WAN 334
article thumbnail

6 signs you might need an executive coach — and 2 signs you don’t

CIO

As technical people move up the ranks, going from coders and admins to managers to CIOs, they need to learn how to do a lot more than build great software, connect backend systems, or build firewalls. They’re also managing people who used to be peers, and they need to organize and motivate their team members to take on major new projects.

Coaching 305
article thumbnail

The Importance of Security and Compliance in Enterprise Applications

OTS Solutions

We will also discuss the negative impact of security and compliance breaches, the benefits of investing in secure and compliant enterprise applications, and how to integrate security and compliance into the development process. The success of this method depends on how weak or strong the password of the victim’s account is.