This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
For this reason, the AI Act is a very nuanced regulation, and an initiative like the AI Pact should help companies clarify its practical application because it brings forward compliance on some key provisions. Inform and educate and simplify are the key words, and thats what the AI Pact is for.
For others, it may simply be a matter of integrating AI into internal operations to improve decision-making and bolster security with stronger fraud detection. According to a Cloudera survey, 72% of business leaders agree that data governance is an enabler of business value, underscoring the critical link between secure data and impactful AI.
But when it comes to cybersecurity, AI has become a double-edged sword. While poised to fortify the security posture of organizations, it has also changed the nature of cyberattacks. While LLMs are trained on large amounts of information, they have expanded the attack surface for businesses.
Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.
In this special edition, we’ve selected the most-read Cybersecurity Snapshot items about AI security this year. ICYMI the first time around, check out this roundup of data points, tips and trends about secure AI deployment; shadow AI; AI threat detection; AI risks; AI governance; AI cybersecurity uses — and more.
In fact, a recent Cloudera survey found that 88% of IT leaders said their organization is currently using AI in some way. Cloudera’s survey revealed that 39% of IT leaders who have already implemented AI in some way said that only some or almost none of their employees currently use any kind of AI tools.
Deloitte surveyed 2,773 director- to C-suite-level respondents experienced with AI, piloting, or implementing gen AI for the Q4 survey between July and September 2024. Key barriers to entry Concern about regulatory compliance has proven a top inhibitor to organizations developing and deploying gen AI tools and applications.
research firm Vanson Bourne to survey 650 global IT, DevOps, and Platform Engineering decision-makers on their enterprise AI strategy. Other key uses include fraud detection, cybersecurity, and image/speech recognition. Data security, data quality, and data governance still raise warning bells Data security remains a top concern.
UIPaths 2025 Agentic AI Report surveyed US IT execs from companies with $1 billion or more in revenue and found that 93% are highly interested in agentic AI for their business. AI agents assist there by validating requirements and compliances when ordering controlled substances and medications.
Launched in 2022, its the most-used gen AI tool in the enterprise, with 62% of respondents to the recent Wharton survey saying they currently use it and 28% saying they dont currently use it but are evaluating or testing it. Wharton found 40% of respondents to its survey are currently using Gemini, and 39% are evaluating or testing it.
The 2024 Board of Directors Survey from Gartner , for example, found that 80% of non-executive directors believe their current board practices and structures are inadequate to effectively oversee AI. Are we prepared to handle the ethical, legal, and compliance implications of AI deployment?
Nearly nine in 10 business leaders say their organizations data ecosystems are ready to build and deploy AI at scale, according to a recent Capital One AI readiness survey. But 84% of the IT practitioners surveyed, including data scientists, data architects, and data analysts, spend at least one hour a day fixing data problems.
CIO.coms 24th annual 2025 State of the CIO research , which surveyed 906 IT leaders and 250 LOB professionals, confirms IT leaders are ramping up their strategic focus this year, in part to convert early AI experimentation into initiatives that deliver measurable business results.
Focused on digitization and innovation and closely aligned with lines of business, some 40% of IT leaders surveyed in CIO.com’s State of the CIO Study 2024 characterize themselves as transformational, while a quarter (23%) consider themselves functional: still optimizing, modernizing, and securing existing technology infrastructure.
The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy. Finally, in addition to security and flexibility, cost is a key factor.
CIOs rank AI as a top priority alongside cybersecurity for IT departments. However, barriers such as adoption speed and security concerns hinder rapid AI integration, according to a new survey. There is a sense of urgency to leverage AI effectively, but adoption speed and security challenges are hindering efforts.
Cybersecurity and systemic risk are two sides of the same coin. Although it was not a security event, the symptoms and responses all fall into the various categories of the cybersecurity program for any company. Systemic risk and overall cybersecurity posture require board involvement and oversight.
According to recent data from IDC’s CIO Sentiment Survey (Figure 1), only 38% of organizations have reached a high level of maturity in their digital transformation efforts (with only about 13% claiming full transformation). And yet, these types of metrics are the limpets of IT measurement — encrusted, intractable, and creating drag.
In a survey of 2,300 IT decision makers that IBM released in December, 47% say theyre already seeing ROI from their AI investments, and 33% say theyre breaking even on AI. According to experts and other survey findings, in addition to sales and marketing, other top use cases include productivity, software development, and customer service.
Artificial intelligence and machine learning Unsurprisingly, AI and machine learning top the list of initiatives CIOs expect their involvement to increase in the coming year, with 80% of respondents to the State of the CIO survey saying so. Other surveys offer similar findings. 1 priority among its respondents as well.
Plus, a new guide says AI system audits must go beyond check-box compliance. And get the latest on cloud security, SMBs' MFA use and the CIS Benchmarks. Document the secure baseline configurations for all IT/OT systems. Secure internet-facing devices. Dive into six things that are top of mind for the week ending Nov.
While 53% of tech execs see AI agents being core to business operations in the next two years, only 29% of IT practitioners see that coming to pass, according to a new survey from uptime monitoring vendor PagerDuty.
Security weaknesses arise Security and risk vulnerabilities are important signs that modernization is immediately necessary. He notes that recent surveys by Gartner and Forrester show that over 50% of organizations cite security and efficiency as their main reasons for modernizing their legacy systems and data applications.
And in another survey conducted by public scientific-tech university Politecnico di Milano, 84% of large Italian companies say they’ve migrated some or all critical data related to core business activities to the cloud. BPS also adopts proactive thinking, a risk-based framework for strategic alignment and compliance with business objectives.
However, managing security on disparate and unmanaged devices is an uphill battle. This challenging new reality requires companies to rethink their security architectures that have not traditionally focused on the browser. There are challenges facing security visibility and controls, too. What can resolve this dilemma?
Check out best practices for shoring up data security and reducing cyber risk. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. 1 - CSA: How to boost data security and reduce cyber risk Risk assessment gaps. Plus, get tips on how to improve job satisfaction among tech staff.
Enterprise IT struggles to keep up with siloed technologies while ensuring security, compliance, and cost management. Deploying AI workloads securely and efficiently across these locations remains a challenge for IT organizations. Business analysts Gartner reports that the time to recruit a new employee has increased by 18%.
In the first installment of Tenables Stronger Cloud Security in Five blog series, we covered cloud security posture management (CSPM), which focuses on protecting your multi-cloud infrastructure by detecting misconfigurations. The report also found that almost all organizations suffered serious cybersecurity incidents.
And as more countries embrace data protection regulation and compliance laws, its driving even more demand for certified professionals. The top paying certification in North America is AWS Certified Security Specialty, which pays $203,597 annually on average.
According to the survey, the city is strong in sectors such as fintech, agritech, hospitality tech, emerging tech, cybersecurity, SaaS and medtech. We’re strong in cybersecurity and (to an arguably lesser extent) fintech. Cybersecurity, fintech, digital — strong medtech — needs building. What does it lack?
Reliability and security is paramount. With AI now incorporated into this trail, automation can ensure compliance, trust and accuracy critical factors in any industry, but especially those working with highly sensitive data. Without the necessary guardrails and governance, AI can be harmful.
Strategies to mitigate AI security and compliance risks By William Reyor Posted in Digital Transformation , Platform Published on: November 7, 2024 Last update: November 7, 2024 According to McKinsey, 65% of executives report that their organizations are exploring and implementing AI solutions.
As a result, managing risks and ensuring compliance to rules and regulations along with the governing mechanisms that guide and guard the organization on its mission have morphed from siloed duties to a collective discipline called GRC. What is GRC? GRC is overarching. Even so, many organizations are still building up their GRC capabilities.
Looking ahead to the next 12-18 months, two top priorities emerge for IT leaders: developing a strong business case for AI infrastructure spending (cited by 35% of respondents to IDC’s Future Enterprise Resiliency and Spending Survey, Wave 3 , March 2024) and increasing cyber resilience and security (34%).
To his point, a 2021 survey by cloud infrastructure security startup Ermetic found that enterprises with over 20,000 employees experienced at least 38% cloud data breaches due to unauthorised access. An analytics dashboard provides usage-based suggestions, visualizations, and insights about access to a customer’s security team.
Delivering high-quality applications predictability and securely is far simpler when you cut back on variety for variety’s sake. Delivering value by empowering the business An interesting and encouraging result from the survey is that a significant 40% of respondents now view cloud native as a mindset rather than just a technology.
Mainframes hold an enormous amount of critical and sensitive business data including transactional information, healthcare records, customer data, and inventory metrics. Much of this data must adhere to regulations for organizations to remain compliant, which is why they are often housed in a secure mainframe.
Back in 2018, Refael Angel, a former security software engineer at Intuit, had an idea for a new approach to protect encryption keys — the random string of bits created to scramble and unscramble data — on the cloud. GitGuardian estimates that app security engineers on average have to handle over 3,400 secrets occurrences.
To learn more about the opportunities they’re chasing and discover how climate change is shaping their investment thesis, he surveyed: Daniela V. “Key, recurring issues relate to copyright licensing and infringement, disclosures and statements in endorsements, compliance with securities laws, and defamation.”
Credit: The Business Impact of Downtime Across Operational Segments , IDC, September 2024; IDC IT/OT Convergence Survey, August 2024, n = 1,041 When ransomware strikes (a disaster almost all technology leaders will experience), the disruption can last for days or even weeks. It ensures a rapid response in the aftermath of a disruption.
A new Foundry survey shows IT leaders are all-in on the idea that artificial intelligence (AI) can help them address a longstanding struggle with enterprise networks: making day-to-day management of networks easier. Close behind: data analytics and business intelligence projects as well as cybersecurity.
Mitigate risks and ensure cybersecurity Financial protection prevents the catastrophic losses of your business. Appraising Talent The 2024 CIO Tech Priorities survey revealed that over 60% of CIOs believe in upskilling or reskilling talent, while 40% believe in hiring new talent.
Security Operations Centers (SOCs) are the backbone of organizational cybersecurity, responsible for detecting, investigating, and responding to threats in real-time. In this blog, we explore how Agentic AI, powered by Cloudera , enhances SOC effectiveness and ensures secure, efficient operations. What are AI Agents?
Mainframe developers face unique challenges when ensuring their IT environments are secure. Tools like open source have helped give a boost to software development, but it also means security needs to always be top of mind. Chief among those challenges? What’s the state of DevSecOps today?
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content