Generative AI, once a buzzword, is now the subject of a focused approach, according to attorney Edward Machin of Ropes & Gray LLP. Organizations are prioritizing specific issues around gen AI and establishing governance frameworks from the outset, Machin said.
Researchers uncovered a critical vulnerability in graphic processing units of popular devices that could allow attackers to access data from large language models. They dubbed the vulnerability LeftoverLocals and said it affects the GPU frameworks of Apple, AMD and Qualcomm devices.
Arati Prabhakar, director of the White House's Office of Science and Technology Policy, said during an event at the 2024 World Economic Forum that generative artificial intelligence has the potential to "dramatically accelerate and amplify the erosion of information integrity."
OpenAI said it is taking steps to prevent use of its models in online influence operations throughout the 2024 election season, amid growing concerns about election security and increasing fears that political deepfakes and AI-generated election misinformation could significantly disrupt democracy.
As a CISO, are you prepared for the benefits and risk of leveraging AI in security operations?
As business leaders and decision makers across various sectors embrace the potential of artificial intelligence (AI), they are confronted with critical questions. These questions are far from baseless, given the...
The British data regulator is set to analyze the privacy implications of processing scraped data used for training generative artificial intelligence algorithms. The Information Commissioner's Office is soliciting comments from AI developers, legal experts and other industry stakeholders.
Federal agencies are making significant headway in achieving a series of critical cybersecurity milestones included in a sweeping executive order on artificial intelligence the president signed in October 2023, according to White House Special Advisor for AI Ben Buchanan.
Artificial intelligence-enabled voter misinformation campaigns and voter database hacking are some of the largest threats to election security in a year when more than half of the world's populace will take to the ballot box in elections ranging from free to flawed.
Hospital and healthcare continue to be targets of cyber attacks and conventional identity governance and administration (IGA) tools struggle to keep up, leaving hidden outliers ripe for exploitation.
However, there's a hero on the horizon — AI! Discover how artificial intelligence and machine learning can help...
In the latest weekly update, ISMG editors discussed how the surge in API usage poses challenges for organizations, why good governance is so crucial to solving API issues and how The New York Times' legal action against OpenAI and Microsoft highlights copyright concerns.
In a year in which the financial impact of cyberattacks has more than doubled to $1.4 million, organizations are exploring generative artificial intelligence but so far mostly sticking to machine learning, Dell reported on Tuesday after surveying 1,500 IT and security decision-makers.
The European Commission took preliminary steps toward investigating Microsoft's financial interest in ChatGPT maker OpenAI under the trading bloc's antitrust regulation. The Tuesday announcement marks the second instance of official interest in Microsoft's investments in the generative AI firm.
Hewlett Packard Enterprise announced a $14 billion acquisition deal with networking equipment maker Juniper Networks and is touting the deal as a way to position the Silicon Valley stalwart for the burgeoning artificial intelligence market. The transaction values Juniper at $40 per share.
ChatGPT maker OpenAI acknowledged that it would be "impossible" to develop generative artificial intelligence systems without using copyrighted material. The company defended its use of copyrighted material, stating that current copyright law does not forbid training data.
What are the keys to unlocking the future of identity security?
Is your identity security program able to match the pace at which your stakeholders are adopting new technologies? For some companies, the answer can be no. Join this webinar to learn more on:
Key ways to measure your Identity Security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.