article thumbnail

Beyond the hype: Key components of an effective AI policy

CIO

Creating a robust AI policy is imperative for companies to address the ethical, legal and operational challenges that come with AI implementation. Understanding the need for an AI policy As AI technologies become more sophisticated, concerns around privacy, bias, transparency and accountability have intensified.

Policies 299
article thumbnail

Dubai’s AI Security Policy: Paving the way for a digital future

CIO

AI Security Policies: Navigating the future with confidence During Dubai AI&Web3 Festival recently hosted in Dubai, H.E. Amer Sharaf, CEO of Cyber Security Systems and Services at Dubai Electronic Security Center, highlighted the importance of establishing robust policies to navigate the evolving AI landscape safely.

Policies 290
article thumbnail

As AI scales, infrastructure challenges emerge

CIO

There might be an extra cost for the new functionality, though, but the vendors are the ones dealing with any potential infrastructure challenges. And that means companies have to invest in infrastructure for training and deploying these systems. That meant that the company had to do some serious infrastructure work.

article thumbnail

Getting infrastructure right for generative AI

CIO

But while the payback promised by many genAI projects is nebulous, the costs of the infrastructure to run them is finite, and too often, unacceptably high. Infrastructure-intensive or not, generative AI is on the march. IDC research finds roughly half of worldwide genAI expenditures in 2024 will go toward digital infrastructure.

article thumbnail

Progress in ICT industry policy and cybersecurity standards drive MENA and Central Asia toward an intelligent era

CIO

Telecom networks are an integral backbone of the digital infrastructure that powers our economies today. Moreover, the deployment of next-generation networks such as 5G and fiber-optic infrastructure requires significant investment and coordinated efforts from governments, regulators, and telecom operators.

Policies 264
article thumbnail

Securing the print infrastructure amid a growing threat landscape

CIO

The print infrastructure is not immune to security risks – on average, paper documents represent 27% of IT security incidents. As businesses start reviewing both their print and PC infrastructure, channel partners will be better equipped to address the requirements of customers looking for standardised solutions.

article thumbnail

Compliance Automated Standard Solution (COMPASS), Part 7: Compliance-to-Policy for IT Operation Policies Using Auditree

Dzone - DevOps

In Part 4 of this multi-part series on continuous compliance, we presented designs for Compliance Policy Administration Centers (CPAC) which are typically part of larger platforms known in the industry under various names such as Cloud-Native Application Protection Platform (CNAPP), Cloud Security Posture Management (CSPM), Cloud Workload Protection (..)