Remove Authentication Remove Document Remove Information Security
article thumbnail

Generative AI: Balancing security with innovation

CIO Business Intelligence

Whether it’s deep fakes or simply more sophisticated phishing attempts, AI is making it easier to steal identities and ramping up the need for more accurate, faster authentication. Visit Discover Technology to learn more about Discover’s approach to security, AI, reliability and more. Misinformation and manipulation of data.

Security 245
article thumbnail

The low-code lessons CIOs can apply to agentic AI

CIO Business Intelligence

Just as importantly, they apply the same compliance, governance, information security, and auditing tools to agentic AI. The majority of firms have citizen development strategies and Bratincevic claims there are documented examples of people whove gotten hundreds of millions of dollars of benefit out of it.

Training 279
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Talking Zero Trust and SASE with CISOs at the Summit

CIO Business Intelligence

There aren’t many events where a critical mass of Chief Information Security Officers gathers to exchange ideas about the current threat environment, key initiatives, etc. The annual Gartner Security and Risk Management Summit is one of them, and I’m looking forward to attending it this year.

WAN 295
article thumbnail

Key considerations to cancer institute’s gen AI deployment

CIO Business Intelligence

For example, people are encouraged to use it for documentation since it’s something many tech people don’t like to do or want to do, says Lenane. Lenane herself uses it to help rewrite emails or documents. “If For example, the AIs could review documentation or create draft messages. People use it for general research, too. “We

article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are we doing about it?

Airlines 278
article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Additionally, Symantec is a founding member of the Open Cybersecurity Schema Framework and the National Cybersecurity Centre of Excellence, which both are working to develop standards for Zero Trust, a security framework that authenticates and validates user identity and access.

Vmware 244
article thumbnail

Low code/no code tools reap IT benefits—with caveats

CIO Business Intelligence

Among other assessment questions, Dann recommends asking if a no code/low code vendor is willing to take part in an information security review, whether their solution has a robust API to integrate with other applications and whether it has an authentication and authorization strategy that fits with the customer’s security processes.

Tools 325