Time to Simplify: A Fresh Look at Infrastructure and Operations for Artificial Intelligence

Time to Simplify: A Fresh Look at Infrastructure and Operations for Artificial Intelligence

The hype triggered by the emergence of generative artificial intelligence (AI) feels a lot like the early days of cloud, bringing the topic—and the need for a strategy—to the front of the IT leader agenda. But while AI is poised to change every aspect of our lives, the complexity of AI infrastructure and operations is holding things back. At Cisco, we believe AI can be a lot easier when we find ways to avoid creating…

Read More

Rogue AI risks and how to mitigate them

Rogue AI risks and how to mitigate them

Rogue AI risks and how to mitigate them | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Responsible AI is built on a foundation of privacy

Responsible AI is built on a foundation of privacy

Nearly 40 years ago, Cisco helped build the Internet. Today, much of the Internet is powered by Cisco technology—a testament to the trust customers, partners, and stakeholders place in Cisco to securely connect everything to make anything possible. This trust is not something we take lightly. And, when it comes to AI, we know that trust is on the line. In my role as Cisco’s chief legal officer, I oversee our privacy organization. In our…

Read More

Fighting the dark side of generative AI

Fighting the dark side of generative AI

Fighting the dark side of generative AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Combatting the next wave of AI fraud

Combatting the next wave of AI fraud

Combatting the next wave of AI fraud | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Security needs to make its voice heard in AI implementations

Security needs to make its voice heard in AI implementations

Security needs to make its voice heard in AI implementations | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

3 rising AI trends CISOs must prepare for

3 rising AI trends CISOs must prepare for

3 rising AI trends CISOs must prepare for | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Creating an impactful culture in remote work environment

Creating an impactful culture in remote work environment

Creating an impactful culture in remote work environment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The 5 most important aspects of a comprehensive cloud security program

The 5 most important aspects of a comprehensive cloud security program

The 5 most important aspects of a comprehensive cloud security program | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 20 21 22 23 24 33