Remove topic cyber-threats
article thumbnail

Sweat the small stuff: Data protection in the age of AI

CIO Business Intelligence

Time is short to deliberate further on activating these cyber protections. Rumored vs. practical threats While the foundations of AI security threats exist, the current landscape is driven more by preventative concerns than actual incidents. training image recognition models to misidentify objects).

Risk 105
article thumbnail

Why Cyber Resilience is Key for Business with AI and ML goals

Jen Stirrup

Why is this topic important? This is where cyber resilience comes in. Hence, it is an important topic, so I attended the Commvault SHIFT event to find out more about the latest innovations. Today, more organizations are embracing a cloud-first approach where cyber resilience is key.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Can ML Fix Cybersecurity Challenges in Healthcare?

Smart Data Collective

It’s no secret that, in recent years, cybersecurity has been an important topic – especially in the healthcare industry. Namely, healthcare has been one of the biggest targets of cyber-attacks. Types of Healthcare Cyber Attacks. One of the most common types of cyber-attacks is phishing. Insider Threats.

article thumbnail

3 Ways AI Has Led to Horrifying Cybersecurity Threats

Smart Data Collective

One of the biggest examples of problems caused by AI is the growing threat of cybersecurity threats. As these threats worsen, organizations and the cybersecurity experts they depend on will need to be aware of the threats AI poses in the hands of hackers and find ways to use AI to fortify their own defenses in turn.

article thumbnail

Competition is stiff, but retailers know what it takes to compete

CIO Business Intelligence

Challenge: Maintaining security is a moving target The highly distributed nature of retail and complex supply chains, along with increasingly sophisticated ransomware and fraud tactics and the growth of organized retail crime schemes, are driving up the risk of retail cyber events. IDC, June 2024).

IT 64
article thumbnail

7 tough IT security discussions every IT leader must have

CIO Business Intelligence

The discussions address changing regulatory and compliance requirements, and reveal vulnerabilities and threats for risk mitigation.” Ongoing IT security strategy conversations should address the organization’s cyber risk and arrive at strategic objectives, Albrecht says. Do we address cyber scenarios to the extent that we should?

IT 142
article thumbnail

Corporate defenses must step up to meet a changing geopolitical landscape

CIO Business Intelligence

But to many people’s surprise, the cyber-attacks have been limited and targeted rather than widespread. Russia certainly has demonstrated its cyber power and capabilities in the past; a key example was the 2016 incident in which Russian hackers took out Ukraine’s power grid. . In preparation for an escalation of cyberattacks on U.S

Risk 119