article thumbnail

Implications of generative AI for enterprise security

CIO

Providing sensitive information to Generative AI programs such as personally identifiable data (PII), protected health information (PHI), or intellectual property (IP) needs to be viewed in the same lens as other data processor and data controller relationships. As such, proper controls must be in place.

Security 467
article thumbnail

New trade body wants to license training data for AI use

CIO

Seven companies that license music, images, videos, and other data used for training artificial intelligence systems have formed a trade association to promote responsible and ethical licensing of intellectual property. These frameworks should identify, evaluate, and address potential risks in AI projects and initiatives.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EU taps AI experts to develop compliance framework for AI regulations

CIO

This could force companies to share sensitive information, raising concerns over intellectual property and competitive advantage. Srinivasamurthy pointed out that key factors holding back enterprises from fully embracing AI include concerns about transparency and data security.

article thumbnail

Modern Network Security: How Technology and Smart Practices are Reducing Risk

CIO

For networking security leaders, too many blind spots in their network security operations means too many vulnerabilities. With the shift to hybrid work, data, applications, intellectual property, and personal information is no longer stashed safely behind a corporate firewall. Network Security

article thumbnail

Sharing Responsibility for Data Security in the Cloud

CIO

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”.

Security 435
article thumbnail

Bridging the gap between legacy tools and modern threats: Securing the cloud today

CIO

However, the swift adoption of cloud infrastructure has also introduced expanded enterprise attacks, the rate at which is often outpacing security precautions. Securing cloud environments is complicated and can seem daunting. Each team has distinct responsibilities and tools, leading to fragmented security efforts that can leave gaps.

Security 417
article thumbnail

How to create secure, collaborative and productive digital workspaces

CIO

For IT, this means selecting the right technology that protects corporate assets and centralizes management of corporate intellectual property (IP), while making business information easy to access from devices employees want to use, as well as creating a work experience that’s collaborative and has comparable performance to being in the office.