article thumbnail

10 things to watch out for with open source gen AI

CIO

A model trained on, say, an archive of flat earth conspiracy theories will be bad at answering science questions, or a model fine-tuned by North Korean hackers might be bad at correctly identifying malware. They’re also full of inaccurate and biased information, malware, and other materials that can degrade the quality of output.

article thumbnail

AI and automation will play an increasing role in technology

CIO

As Michael Dell predicts , “Building systems that are built for AI first is really inevitable.” It’s also been flagged as a risk: cybersecurity companies have identified bad actors using ChatGPT to create malware. Artificial Intelligence, IT Leadership That’s usually a sign that the use of an application has become widespread.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Your Supply Chain with Data-Aware Security

CIO

It’s not uncommon to create a link to content in a system that can easily be shared with a third-party contractor or supplier, or to invite them to be a member of a specific Teams group or Slack channel. While malware gets most of the attention in the public imagination, users remain a bigger risk when it comes to security.

Data 228
article thumbnail

A CIO primer on addressing perceived AI risks

CIO

And so, just as malware countermeasures evolved from standalone antivirus measures to cybersecurity as a whole industry, we can expect a similar trajectory for deepfake countermeasures as the war on reality heats up. In AI terms, thinking slow is what expert systems, and for that matter, old-fashioned computer programming, do.

article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

In August 2022, the French hospital Centre Hospitalier Sud Francilien (CHSF) was the victim of a ransomware attack that disabled medical imaging and patient admission systems. 3 Unit 42 research also found that 83% of ultrasound, MRI, and CT scanners run on an end-of-life operating system. IT Leadership Simplify operations.

IoT 186
article thumbnail

The Proverbial “Water Cooler” Discussions 2024: Key Topics that Drive Enterprise Storage Conversations (Part One)

Infinidat

Rather, it’s expanding again, enormously, which makes it all the more problematic that too many enterprises are leaving their enterprise storage systems vulnerable to cyberattacks due to lack of intelligent cyber resilience and recovery. Cyber detection serves as an early warning system to help you protect the data.

Storage 59
article thumbnail

Leaky Apps – How Banning Them Builds App Security

Ivanti

Insider threats The risk from insider threats is a major concern in app security, due to the difficulty of detecting malicious insiders who already have legitimate access to systems and data. On top of malicious software, apps can provide unauthorized access to your system, allowing attackers to gain access and exploit your data.