|
|
|
|
Get all of the AI insights, with none of the filler
Christopher Jablonski, Director, CXO REvolutionaries & Community, Zscaler
Our latest quarterly cyber update, “
AI Trends and Security Insights for the C-Suite,” focuses on AI adoption trends, security issues, and social impact–and it’s packaged for ease of consumption and convenience for executives. The cacophony of AI/ML content in our space is as high as it has ever been, so we stuck with some key goals behind these reports that you may appreciate:
- Deliver value to technical and non-technical executives
- Provide steps all CXOs can understand and implement
- Provide actionable information that can be read in about 10 minutes
|
|
|
|
Summer may be coming to a close but the fall season is heating up with our in-person experiences. First up are a pair of
CXO Exchanges in the US and Europe, followed by
Women in IT & Security in January. We look forward to providing more details, including speaker info and agendas in the next CXO Voices editions.
Reserve your seats today. Learn more about all upcoming
CXO events.
|
|
|
|
Essential CXO Thought Leadership:
Privacy & security concerns with AI meeting tools
Rob Sloan, Vice President, Cybersecurity Advocacy, Zscaler
AI-powered meeting assistants like Otter.ai, Zoom AI Companion, and Microsoft 365 Copilot promise increased employee productivity and a reliable record of discussions by attending online meetings alongside or instead of participants.
AI assistants can record video and transcribe audio, summarize notes and actions, provide analytics, and even coach speakers on more effective communication. But do the benefits outweigh the associated security and privacy risks?
Consider this: If a stranger appeared in a meeting room, intent on recording the conversation and using that information for unknown purposes, would that person be allowed to proceed unchallenged?.
Read the full story in Dark Reading.
|
|
|
|
|
Editor's Picks & Events
Zscaler is once again hitting the road for a pair of CXO Exchanges this fall. We will be hosting the leading minds of IT & security in South Beach, Miami on October 10-11 and Valencia, Spain on November 21-22. Join your peers and Zscaler leadership for this essential networking, skill-building, and strategic planning opportunity.
Learn more and sign up
|
In the past five years, multiple crises and disruptions have introduced a new word to the lexicon: “resilient manufacturing.” This is an approach not pivoted on cost, productivity, or profitability, but rather on the ability of a manufacturing organisation to continue to function in the face of unexpected conditions and adverse eventualities.
Explore IT’s role in resilient manufacturing
|
On any day, you'll likely see a breach or some cyber incident that hurts a big company's reputation. If you feel like it’s “open season” for threat actors, that’s because it is. They can scan for vulnerabilities in less than an hour and use generative AI to write malware in minutes rather than days. Cloud apps and services, hybrid work, AI, and other digital transformation trends have expanded attack surfaces.
Top tips for managing your attack surface
|
In today's evolving cyber threat landscape, traditional network security models are increasingly inadequate. More robust and dynamic security paradigms like zero trust network access (ZTNA) are needed. As organizations adopt ZTNA, artificial intelligence and machine learning are emerging as pivotal technologies that can significantly enhance the implementation and maturation of these frameworks.
How AI/ML enhance zero trust network access
|
The recent ransomware attack that crippled the operations of customers of CDK Global, a software provider to nearly 15,000 vehicle dealerships across North America, is emerging as a stark illustration of issues with Securities and Exchange Commission (SEC) cybersecurity reporting requirements as they exist today. Although the incident affected dealerships around the country for two weeks, CDK's parent company insists it did not meet its materiality threshold.
Then why were its customers filing 8-Ks?
|
|
|
|
|
|
|