article thumbnail

Dulling the impact of AI-fueled cyber threats with AI

CIO

But when it comes to cybersecurity, AI has become a double-edged sword. While poised to fortify the security posture of organizations, it has also changed the nature of cyberattacks. While LLMs are trained on large amounts of information, they have expanded the attack surface for businesses.

article thumbnail

IT leaders: What’s the gameplan as tech badly outpaces talent?

CIO

Hes seeing the need for professionals who can not only navigate the technology itself, but also manage increasing complexities around its surrounding architectures, data sets, infrastructure, applications, and overall security. Other surveys found a similar gap. Weve been innovating with AI, ML, and LLMs for years, he says.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

To better manage cybersecurity risk, extend zero-trust principles to third parties

TechCrunch

Saket Modi is the co-founder and CEO of Safe Security, a cybersecurity and digital business risk quantification platform company. Today’s cybersecurity landscape requires an agile and data-driven risk management strategy to deal with the ever-expanding third-party attack surface. Saket Modi. Contributor. Share on Twitter.

Survey 279
article thumbnail

Securing Remote OT Operations:

Palo Alto Networks

However, these advancements come with heightened security risks. This expanded attack surface has made OT systems a prime target for cyber threats, underscoring the need for a robust security framework tailored to remote OT environments. However, visibility alone is not enough.

Security 111
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

AI market evolution: Data and infrastructure transformation through AI

CIO

research firm Vanson Bourne to survey 650 global IT, DevOps, and Platform Engineering decision-makers on their enterprise AI strategy. Other key uses include fraud detection, cybersecurity, and image/speech recognition. Data security, data quality, and data governance still raise warning bells Data security remains a top concern.

article thumbnail

When voice deepfakes come calling

CIO

Intro: Time was, a call center agent could be relatively secure in knowing who was at the other end of the line. And if they werent, multi-factor authentication (MFA), answers to security questions, and verbal passwords would solve the issue. How fraudsters use audio deepfakes 1. Often, bots are involved in this process.

article thumbnail

Embedded Analytics Insights for 2024

To better understand the factors behind the decision to build or buy analytics, insightsoftware partnered with Hanover Research to survey IT, software development, and analytics professionals on why they make the embedded analytics choices they do.