Remove Artificial Intelligence Remove CSO Remove Cyber threats
article thumbnail

North Dakota turns to AI to boost effectiveness and efficiency of its cybersecurity

CSO Magazine

The recent proliferation of tools that employ artificial intelligence (AI) or machine learning (ML) to perform human-like tasks has sparked a great deal of interest in the cybersecurity community. To read this article in full, please click here

article thumbnail

Deloitte-NASCIO Study: AI and Cyber Threats Reshape the Landscape

SecureWorld News

Th e 8th biennial Deloitte-NASCIO Cybersecurity Study reveals a rapidly evolving cybersecurity landscape, with artificial intelligence (AI) and generative AI (GenAI) introducing new challenges. states and the District of Columbia, marking a period where the impact of COVID-19 has subsided yet new threats have surfaced.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

By spearheading cybersecurity programs, CISOs empower organizations to fend off cyber threats from criminal enterprises, insider risks, hackers, and other malicious entities that pose significant risks to operations, critical infrastructure, and even national security. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.

CISO 104
article thumbnail

The Relevance of Privacy-Preserving Techniques and Generative AI to DORA Legislation

Thales Cloud Protection & Licensing

To address these challenges, the European Union introduced the Digital Operational Resilience Act (DORA) in 2022, designed to ensure that financial entities can withstand and recover from cyber threats while maintaining operational continuity. The world has changed.

article thumbnail

BrandPost: 4 Trends in Network Security to Keep an Eye On

CSO Magazine

Monitoring cyberthreats; correlating cyber threat intelligence with internal security telemetry; and keeping up with the tactics, techniques, and procedures used by adversaries is no easy proposition.