article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO

In my previous column in May, when I wrote about generative AI uses and the cybersecurity risks they could pose , CISOs noted that their organizations hadn’t deployed many (if any) generative AI-based solutions at scale. So I think the real risk here is the exposure of sensitive information. What a difference a few months makes.

article thumbnail

To better manage cybersecurity risk, extend zero-trust principles to third parties

TechCrunch

Saket Modi is the co-founder and CEO of Safe Security, a cybersecurity and digital business risk quantification platform company. Today’s cybersecurity landscape requires an agile and data-driven risk management strategy to deal with the ever-expanding third-party attack surface. Saket Modi. Contributor. Share on Twitter.

Survey 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

And a global survey shows cyber pros weighing pros and cons of AI. 1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? Plus, CERT’s director says AI is the top skill for CISOs to have in 2024.

article thumbnail

How Zero Trust can help align the CIO and CISO

CIO

The role of the CIO (Chief Information Officer) and CISO (Chief Information Security Officer) have become increasingly important in recent years as organizations place more emphasis on digital transformation and information security. government further highlights the importance of the zero trust security framework.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

IP and cybersecurity disputes are top legal concerns for tech companies

TechCrunch

head of eDiscovery and Information Governance. Susana Medeiros is an associate in Norton Rose Fulbright’s New York office and member of the information governance, privacy and cybersecurity group who counsels clients on information governance, data disposition, eDiscovery and cyber incident response issues. Contributor.

article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Plus, a new survey shows cybersecurity pros are guardedly optimistic about AI. And the NSA is sharing best practices for data security. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week. And much more!