Remove Information Remove Intellectual Property Remove Loss Remove Management
article thumbnail

Enabling productivity and scale through improved enterprise knowledge management

CIO

As the amount of knowledge generated within organizations continues to rise, firms must implement systems that make it easy for employees to find the information they need when they need it. Yet knowledge workers still spend a disproportionate amount of time searching for information. To read this article in full, please click here

Knowledge 616
article thumbnail

Implications of generative AI for enterprise security

CIO

But unlike human learning, the power of crowd-source data combined with the right information in Generative AI means that processing answers will be light years faster. The use of AI presents significant issues around sensitive data loss, and compliance. Information fed into AI tools like ChatGPT becomes part of its pool of knowledge.

Security 779
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generative AI and the Transformation of Everything

CIO

Information loaded into it becomes data that any other subscriber has access. Another major concern is copyright infringement and intellectual property (IP). A 25+ year software veteran, Alex is responsible for product strategy, product management and marketing for all of Symantec. Generative AI

article thumbnail

Generative AI: 5 enterprise predictions for AI and security — for 2023, 2024, and beyond

CIO

The release of intellectual property and non-public information Generative AI tools can make it easy for well-meaning users to leak sensitive and confidential data. In both cases, sensitive information or protected IP may have leaked outside the organization. In general, they fall into two buckets: 1.

Security 835
article thumbnail

CIOs weigh where to place AI bets — and how to de-risk them

CIO

We need to be ready to respond to our CEO to solve problems with AI,” says Srini Gudipati, CIO of Covanta, a company that specializes in sustainable materials management, including large-scale recycling. This ensures that none of our sensitive data and intellectual property are availed to an outside provider.”

article thumbnail

Sharing Responsibility for Data Security in the Cloud

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. Specifically, the study attributed an average $4 million loss to business disruption, with another $5.9 Cloud Security

Security 725
article thumbnail

Understanding the security shared responsibility model in an as-a-service world

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. Specifically, the study attributed an average $4 million loss to business disruption, with another $5.9

Security 596