Remove information-security-vs-product-security
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO

Generative AI systems are information content development tools, not robots — you can ask such a tool to “Tell me all the common ways to infect a machine,” but you cannot ask it to “Infect these machines at this company.” Copyright Issues: Enterprise employees use Generative AI to create content such as source code, images, and documents.

article thumbnail

Information Security vs. Product Security: Who's to Navigate, Who's to Steer?

Security Innovation

Our discussion was broad-ranging and included everything from the impact of artificial intelligence on security to cryptocurrency and security roles. In a recent Ed TALKS, I had the distinct pleasure of hosting three prolific industry thought leaders in cybersecurity: Matthew Rosenquist , Shira Rubinoff , and John Yeoh.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is a data architect? Skills, salaries, and how to become a data framework master

CIO

Information/data governance architect: These individuals establish and enforce data governance policies and procedures. Data security architect: The data security architect works closely with security teams and IT teams to design data security architectures.

Data 330
article thumbnail

Generative AI: 5 enterprise predictions for AI and security — for 2023, 2024, and beyond

CIO

Zscaler Enterprises will work to secure AI/ML applications to stay ahead of risk Our research also found that as enterprises adopt AI/ML tools, subsequent transactions undergo significant scrutiny. For example, a backend developer who queries ChatGPT, “Can you take this [my source code for a new product] and optimize it?”

article thumbnail

3 things to consider when building responsible GenAI systems

CIO

The challenge with GenAI is that it can spew out inaccuracies, mistruths, and incoherent ‘information’ with such confidence and eloquence that it is easy to take them at face value. Finally, there are the evergreen concerns of security and privacy. Or it could simply be inaccurate. But Subramanian recommends a three-pronged approach.

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 242
article thumbnail

What your CFO really needs in periods of economic uncertainty

CIO

Keep tabs on the keep the lights on (KTLO) budget If you fall on hard times in your personal life, you pay for your mortgage, health insurance, and groceries first to cover the necessities: shelter, security, and food, respectively. Securing the technical estate from bad actors?

Budget 246