article thumbnail

AI & the enterprise: protect your data, protect your enterprise value

CIO

For example, employees might inadvertently broadcast corporate secrets by inputting sensitive company information or source code into public-facing AI models and chatbots. Human error in data loss Human error remains a critical weak link in d a ta loss. Things will get worse.

article thumbnail

Sweat the small stuff: Data protection in the age of AI

CIO

Most of the evidence is academic at this point in time.However, executives who have deployed their own models have begun to focus on how to protect their integrity, given it will be only a matter of time before a major attack becomes public information, resulting in brand damage and potentially greater harm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 steps to get your data AI ready

CIO

To regularly train models needed for use cases specific to their business, CIOs need to establish pipelines of AI-ready data, incorporating new methods for collecting, cleansing, and cataloguing enterprise information. The risk of exposing intellectual property also has to be mitigated, especially when AI is offered as a cloud-based service.

article thumbnail

New trade body wants to license training data for AI use

CIO

Seven companies that license music, images, videos, and other data used for training artificial intelligence systems have formed a trade association to promote responsible and ethical licensing of intellectual property.

article thumbnail

EU taps AI experts to develop compliance framework for AI regulations

CIO

This could force companies to share sensitive information, raising concerns over intellectual property and competitive advantage. On the other hand, such a push for transparency could also drive wider AI adoption, according to Sharath Srinivasamurthy, associate VP of research at IDC.

article thumbnail

Overcoming data compliance and security challenges in the age of AI

CIO

Without proper data governance, transparency, and security, customer data, intellectual property, or other sensitive corporate information can be fed into LLM models, risking unintended data leakage. Look for solutions that honor role-based access controls and ensure sensitive information is only accessible to authorized users.

Security 307
article thumbnail

Cognizant sues Infosys for misusing shared information

CIO

A lawsuit filed in a Texas federal court on Friday is a good illustration of the problems that can arise when two competitors — or even potential competitors — sign Non-Disclosure and Access Agreements (NDAAs) to share sensitive information to ostensibly help mutual customers. Rather, the complaint alleges that they misused the information.