In a move to integrate AI into its products, Apple launched “Apple Intelligence” and “Privacy Cloud Compute” for enhanced privacy, with a beta release set for this fall.
Search Results: CISO (327)
The OWASP AI Cybersecurity & Governance Checklist outlines actionable recommendations for optimizing cybersecurity posture in the era of GenAI and LLM.
Databricks’ AI Security Framework illuminates the path to secure and compliant AI adoption, addressing critical security risks across various stages of AI systems.
This guidebook offers insights on making zero trust a reality in our businesses, minimizing vulnerabilities that come with SaaS applications, mobile devices, and hybrid work environments.
Chris Hughes explains why sharing insights from threat intelligence with other senior execs can be a force multiplier in reducing organizational risk.
Establishing a strong working relationship between the CISO and the CIO is crucial for the overall success and security of a company, writes Kenny Mullican.
A briefing featuring three CISO Practitioner Analysts discussing the state of the market, CISO priorities, Multi-Cloud Cybersecurity, SaaS Security, and the impact of Generative AI.
Rob Wood and Chris Hughes discuss XDR, a hot topic at RSA, particularly around its role in consolidating and integrating data to gain insight on distributed workforce security.
Bob Evans and Chris Hughes discuss the evolving role of the CIO, and explore the relationship between a CIO and a CISO in this Digital CIO Summit moment.
Rob Wood explains how organizations can avoid complications from compliance and other requirements in financial automation projects.
CISOs and CFOs should collaborate to establish clear goals, enumerate data requirements, and identify supporting tools for financial automation projects while effectively managing risk.
Frank Domizio shares his thoughts on cybersecurity’s place in the C-suite today, as well as the value of customer stories on software and other technology solutions.
Aproveche los partners de ciberseguridad para reforzar su infraestructura y completar la falta de un recurso CISO interno.
Rob Wood and Aaron Back explore the evolving relationship between CIOs and CISOs and discuss the importance of sharing customer stories.
Developers need guidance from CISOs to protect corporate data stores, ensure compliance, and spot disgruntled employees, and more, analysts Chris Hughes and Paul Swider explain.
Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.
Frank Domizio explains how partnering with a CISO can provide expertise, tools, and support to ensure that sensitive data remains secure.
Frank Domizio aporta una visión sobre ciberseguridad en el desarrollo de citizen developers y desarrollos de aplicaciones low-code no-code.
John Siefert, Wayne Sadin, Chris Hughes, and John Muehling discuss why data modernization needs require C-suite execs to collaborate.
Janet Schijns outlines eights services a cybersecurity channel partner can offer your company, especially if you’re not resourced to hire a CISO.