Remove learn-to-leverage-ai-responsibly-skillfully
article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

Could artificial intelligence (AI) be the key to outsmarting cyber threats in an increasingly connected world? These are questions I’ve been asking myself recently as AI and cybercrime have become hot topics in the tech industry, and for world leaders. This is where AI comes in as a potential game-changer.

article thumbnail

GUEST ESSAY: A primer on why AI could be your company’s cybersecurity secret weapon in 2022

The Last Watchdog

Artificial intelligence (AI) is woven into the fabric of today’s business world. However, business model integration of AI is in its infancy and smaller companies often lack the resources to leverage AI. Even so, AI is useful across a wide spectrum of industries. Related: Deploying human security sensors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) For the first expert interview on our blog, we welcomed Pulitzer-winning investigative reporter Byron V.

article thumbnail

CIO in the Age of AI: A Title Under Threat?

SecureWorld News

With the advent of artificial intelligence (AI), machine learning (ML), and generative AI, questions have arisen regarding the continued relevance of the CIO title and whether it accurately reflects the evolving nature of the job. I think we are too focused on titles. By the way, the CISO should not be reporting to the CIO.

CISO 103
article thumbnail

GUEST ESSAY: Securely managing access controls is vital to preserving the privacy of healthcare data

The Last Watchdog

With the benefits of the cloud comes the heavy responsibility of securing sensitive data. It encompasses identity access and management, privileged access management, password-less management controls, detection and response technology, encryption from the endpoint, through the network and into cloud and on-premises hosting environments.

article thumbnail

The Security Challenges of Generative AI Tools: Can a Loose Prompt Sink Your Ship?

Thales Cloud Protection & Licensing

The Security Challenges of Generative AI Tools: Can a Loose Prompt Sink Your Ship? Fast forward to 2023, and this adage finds new meaning in the context of generative AI tools, like OpenAI ChatGPT, Google Bard, and Microsoft Copilot. What are generative AI tools? These AI tools are based on Large Language Models (LLM).

article thumbnail

Manual vs Automated Risk Management: What You Need to Know

Centraleyes

Here’s why relying solely on spreadsheets for risk management can lead to inefficiencies and missed opportunities: Lack of Clarity and Connectivity: The manual nature of spreadsheet inputs makes it challenging to visualize risks and their associated responsibilities.

Risk 52