article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks. It’s easy to envision the outcomes that could arise from a major assault on our vital infrastructure.

article thumbnail

10 things to watch out for with open source gen AI

CIO

Even if you don’t have the training data or programming chops, you can take your favorite open source model, tweak it, and release it under a new name. Apple actually released not just the code, but also the model weights, the training data set, training logs, and pre-training configurations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO

These issues are akin to leaving the front door to your digital infrastructure unlocked. Malware is the top threat to IoT/OT With so many vulnerabilities plaguing IoT devices, these devices are attractive and relatively easy entry points into corporate networks for attackers. of the total number of attempted IoT malware attacks.

IoT 310
article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

Not all that long ago, it was common for enterprises to rely on signature-based detection for malware, static firewall rules for network traffic and access control lists (ACLs) to define security policies. Challenge 2: The access to large amounts of training data, especially labeled data.

article thumbnail

How to manage cloud exploitation at the edge

CIO

The Infrastructure-as-a-Service (IaaS) cloud computing model enables remote working, supports digital transformation, provides scale, increases resilience, and can reduce costs. As with all technology introductions, it’s important to have clear security policies, tools, processes, and training. Watch on-demand here.

Cloud 234
article thumbnail

Endpoint security and the rise of Managed Device Services

CIO

Despite growing interest in “as a service” consumption models for everything from infrastructure to storage, most enterprises have continued to procure, maintain, and manage endpoint devices in-house. After all, who is better able to configure and manage a device than its manufacturer?

Windows 220
article thumbnail

A new era of cybersecurity with AI: Predictions for 2024

CIO

Therefore, not only do we need to build security in design – make sure we build secure models and prevent training data from being poisoned — but also continue evaluating and monitoring LLM systems after deployment for their safety, security, and ethics. They can also leverage LLMs to create brand-new malware. On October 30, 2023, U.S.