article thumbnail

EU taps AI experts to develop compliance framework for AI regulations

CIO

This could force companies to share sensitive information, raising concerns over intellectual property and competitive advantage. Srinivasamurthy pointed out that key factors holding back enterprises from fully embracing AI include concerns about transparency and data security.

article thumbnail

Given IBM consulting’s genAI rollout, should CIOs rethink consulting strategies for 2025?

CIO

So model operations, model deployment, model quality, model costs, model security, become critical checkboxes in any sourcing decision.” So if you want to generate an image, and you want to do it for extraordinarily low cost, you can use Dall-E, but you have to use it in a way where you know the intellectual property concerns don’t exist.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New trade body wants to license training data for AI use

CIO

Seven companies that license music, images, videos, and other data used for training artificial intelligence systems have formed a trade association to promote responsible and ethical licensing of intellectual property. These frameworks should identify, evaluate, and address potential risks in AI projects and initiatives.

article thumbnail

Implications of generative AI for enterprise security

CIO

Providing sensitive information to Generative AI programs such as personally identifiable data (PII), protected health information (PHI), or intellectual property (IP) needs to be viewed in the same lens as other data processor and data controller relationships. As such, proper controls must be in place.

Security 771
article thumbnail

AI will evolve the role of the CIO

CIO

As a support technology, AI works on data that is dependable, proven, and secure,” says Langer. Lead AI disruption CIOs face the challenge of protecting intellectual property and data as AI tools make it easier for cybercriminals to launch potentially devastating attacks.

article thumbnail

Bridging the gap between legacy tools and modern threats: Securing the cloud today

CIO

However, the swift adoption of cloud infrastructure has also introduced expanded enterprise attacks, the rate at which is often outpacing security precautions. Securing cloud environments is complicated and can seem daunting. Each team has distinct responsibilities and tools, leading to fragmented security efforts that can leave gaps.

Security 686
article thumbnail

How to create secure, collaborative and productive digital workspaces

CIO

For IT, this means selecting the right technology that protects corporate assets and centralizes management of corporate intellectual property (IP), while making business information easy to access from devices employees want to use, as well as creating a work experience that’s collaborative and has comparable performance to being in the office.