article thumbnail

Implications of generative AI for enterprise security

CIO

But unlike human learning, the power of crowd-source data combined with the right information in Generative AI means that processing answers will be light years faster. Information fed into AI tools like ChatGPT becomes part of its pool of knowledge. These systems are like the processes of human learning.

Security 753
article thumbnail

How to create secure, collaborative and productive digital workspaces

CIO

For IT, this means selecting the right technology that protects corporate assets and centralizes management of corporate intellectual property (IP), while making business information easy to access from devices employees want to use, as well as creating a work experience that’s collaborative and has comparable performance to being in the office.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Modern Network Security: How Technology and Smart Practices are Reducing Risk

CIO

For networking security leaders, too many blind spots in their network security operations means too many vulnerabilities. With the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. Network Security

article thumbnail

Generative AI: 5 enterprise predictions for AI and security — for 2023, 2024, and beyond

CIO

Zscaler Enterprises will work to secure AI/ML applications to stay ahead of risk Our research also found that as enterprises adopt AI/ML tools, subsequent transactions undergo significant scrutiny. In both cases, sensitive information or protected IP may have leaked outside the organization. In general, they fall into two buckets: 1.

Security 833
article thumbnail

Sharing Responsibility for Data Security in the Cloud

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”.

Security 718
article thumbnail

Understanding the security shared responsibility model in an as-a-service world

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”

Security 512
article thumbnail

When your AI chatbots mess up

CIO

“Chatbots are almost like a living organism in that they are continually iterating, and as they ingest new data,” says Steven Smith, chief security architect at Freshworks. For engineers, AI-generated code used in software development may contain security vulnerabilities or intellectual property ingested during training.