Remove Intellectual Property Remove IT Remove Management Remove Security
article thumbnail

Implications of generative AI for enterprise security

CIO

Providing sensitive information to Generative AI programs such as personally identifiable data (PII), protected health information (PHI), or intellectual property (IP) needs to be viewed in the same lens as other data processor and data controller relationships. It inspires awe and unease — and often both at the same time.

Security 712
article thumbnail

How to create secure, collaborative and productive digital workspaces

CIO

For IT, this means selecting the right technology that protects corporate assets and centralizes management of corporate intellectual property (IP), while making business information easy to access from devices employees want to use, as well as creating a work experience that’s collaborative and has comparable performance to being in the office.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 IT rules worth breaking — and how to get away with it

CIO

Management rules typically exist to enable faultless decision-making, set a foundation for consistent operation, and provide protection from risk, observes Ola Chowning, a partner at global technology research and advisory firm ISG. Still, there are some occasions when following a long-established rule simply doesn’t make sense.

IT 870
article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO

Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. But with time, CIOs are starting to figure out ways to manage the use of generative AI within the enterprise. So, simply blocking LLM access is not the right answer. government’s attention.

article thumbnail

Modern Network Security: How Technology and Smart Practices are Reducing Risk

CIO

For networking security leaders, too many blind spots in their network security operations means too many vulnerabilities. With the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. How a managed services partner can help.

article thumbnail

Generative AI: 5 enterprise predictions for AI and security — for 2023, 2024, and beyond

CIO

Zscaler Enterprises will work to secure AI/ML applications to stay ahead of risk Our research also found that as enterprises adopt AI/ML tools, subsequent transactions undergo significant scrutiny. Indeed, its substantial engagement in these tools highlights the likely key role that AI and ML will play in the future of manufacturing.

Security 821
article thumbnail

Sharing Responsibility for Data Security in the Cloud

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”.

Security 696