article thumbnail

What is AI’s current impact on cybersecurity?

CIO

In our inaugural episode, Michael “Siko” Sikorski, CTO and VP of Engineering and Threat Intelligence at Unit 42 answers that question and speaks to the profound influence of artificial intelligence in an interview with David Moulton, Director of thought leadership for Unit 42. What’s Sikorski’s critical concern?

article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

Why securing cloud workloads is an urgent matter In recent years, major cloud service providers encountered 6,000 malware samples actively communicating with them, underlining the magnitude of cloud security challenges. 3 We have seen an increase of 15% in cloud security breaches as compared to last year. 8 Complexity.

Cloud 338
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI and automation will play an increasing role in technology

CIO

It’s also been flagged as a risk: cybersecurity companies have identified bad actors using ChatGPT to create malware. Artificial Intelligence, IT Leadership For example, teachers are even adjusting their curriculums to ensure students are writing original work and not just using ChatGPT to write their assigned essays.

article thumbnail

A CIO primer on addressing perceived AI risks

CIO

And so, just as malware countermeasures evolved from standalone antivirus measures to cybersecurity as a whole industry, we can expect a similar trajectory for deepfake countermeasures as the war on reality heats up. Artificial Intelligence, IT Leadership, Risk Management

article thumbnail

Register now: GenAI, risk & the future of security

CIO

Along with the promise is the peril of AI being used to cause harm by launching more efficient malware, creating sophisticated deepfakes, or by unintentionally disclosing code or trade secrets. Careers, IT Leadership, Security Practices Check out the full summit agenda here. The event is free to attend for qualified attendees.

Malware 130
article thumbnail

Protecting Your Supply Chain with Data-Aware Security

CIO

While malware gets most of the attention in the public imagination, users remain a bigger risk when it comes to security. IT Leadership, Supply Chain Management Software The simple fact is that partners and suppliers need access to an organization’s data in order to be productive.

Data 264
article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

As these devices communicate across clinical environments and with external networks and services, they ensure that you establish baseline behavior, monitor devices for anomalous behavior, and protect network-connected devices against threats such as malware. IT Leadership Simplify operations. What is the device?

IoT 252