Remove CTO Hire Remove Information Security Remove Open Source
article thumbnail

Scale and Speed with Cyber Security

CTOvision

The number one organizing principle has to be speed and its speed operating at every level within an enterprise: from how software gets built to how it gets deployed to how it evolves to how fast HR can fire and hire people, the speed of light infects everything, it has to be optimized for.

Security 271
article thumbnail

Regulatory uncertainty overshadows gen AI despite pace of adoption

CIO Business Intelligence

In July, for example, New York City started enforcing new rules about the use of AI in hiring decisions. As companies mature in their understanding and use of gen AI, they’ll have to put safeguards in place, says Juan Orlandini, CTO, North America at Insight, a Tempe-based solution integrator. That includes cybersecurity risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

More and more criminals are identified through open source intelligence (OSINT). Find out what Daniel looks for and how he does digital forensics using social media and other open source resources. And they did, relatively quickly, using something known as Open Source Intelligence, or OSINT. You find clues.

article thumbnail

7 key questions CIOs need to answer before committing to generative AI

CIO Business Intelligence

Then, when that didn’t work, it hired it’s own team to build the proprietary models it needed. But we sat down and fed it contracts and asked it nuanced questions about them: where are the liabilities, where are the risks,” he says. “But This is real meat and bones, tearing the contract apart, and it was 100% effective.