Remove Document Remove Firewall Remove Information Security
article thumbnail

AI and cybersecurity: A double-edged sword

CIO Business Intelligence

Gone are the days when simple firewalls and antivirus software could keep our digital assets safe. Companies like CrowdStrike have documented that their AI-driven systems can detect threats in under one second. The cybersecurity world has changed dramatically. For starters, its revolutionizing threat detection and response.

Security 306
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sweat the small stuff: Data protection in the age of AI

CIO Business Intelligence

Rumored vs. practical threats While the foundations of AI security threats exist, the current landscape is driven more by preventative concerns than actual incidents. Weve heard rumors of model contamination or poisoning, even though documented research shows potential vulnerabilities (e.g.,

Data 264
article thumbnail

Talking Zero Trust and SASE with CISOs at the Summit

CIO Business Intelligence

There aren’t many events where a critical mass of Chief Information Security Officers gathers to exchange ideas about the current threat environment, key initiatives, etc. The annual Gartner Security and Risk Management Summit is one of them, and I’m looking forward to attending it this year.

WAN 295
article thumbnail

CIOs are worried about the informal rise of generative AI in the enterprise

CIO Business Intelligence

Not all companies have security systems that can detect, block, or remediate this type of behavior. Another information security executive cited Samsung’s temporary ban of ChatGPT in its systems. Controlling the Gen AI outbreak What can CISOs and corporate security experts do to put some sort of limits on this AI outbreak?

article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are we doing about it?

Airlines 278
article thumbnail

Critical Actions Post Data Breach

SecureWorld News

Physical security must also be addressed. Be sure to secure server rooms, document archives, and other sensitive areas that could be involved in the incident. Update door access codes and verify that all physical security measures are functioning properly. Introduce MFA for all corporate accounts.

Data 112