At AI Summit Vancouver, experts explored AI ethics, security practices, and balancing innovation with a responsibility to shape a safer AI-empowered future.
Thanks to ChatGPT, you’ve probably heard a lot about generative AI technology over the last few years. Generative AI is artificial intelligence technology that works by taking input data like a request, processing it through different algorithms, and producing an output based on learned patterns. ChatGPT is a generative AI chatbot. 91% of security teams use generative AI, but 65% don’t fully understand the implications.
Managed Apple Accounts may offer some benefits to workplace security, but teams will have to consider whether it’s worth the sacrifice to the end-user experience.
AT&T had a big data breach in early 2024, which let millions of customer records with private and sensitive information become public. People were scared by this event, and it also made people question AT&T's data protection policies. The AT&T Data Breach Lawsuit was started because of this, with customers asking for money and information about the company's safety measures. A lot of people are worried about this case, which shows how vulnerable businesses are in the current scenario.
Everyone remembers that one required writing class they needed to take. If you’re like a lot of other security analysts, you assumed that your job would focus on using technology, not writing research papers. However, in today’s business environment, cyber incidents are critical business events, especially as governments and agencies create more reporting requirements.
Do you know how secure your organization’s mobile devices are? You may have a handle on your on-premises device and network security, but the rise of remote employee access and bring-your-own-device (BYOD) policies has created new security challenges. Many organizations rely on endpoint detection and response (EDR) solutions to keep their traditional endpoints secure, but these solutions often don’t prioritize mobile endpoint security.
In this episode of the Trust Issues podcast, host David Puner and David Lee, aka “The Identity Jedi,” delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel’s Jarvis.
Mobile devices now account for more than half of all web traffic, and that number seems poised to increase over the next few years. Between the Apple App Store and Google Play Store, there are already more than 5 million applications available — and not all of them are safe. A smart mobile app security strategy can mitigate some of the threats that come from unauthorized, misconfigured, or malicious software.
While having your own identity stolen is stressful and scary, you will likely be even more terrified if someone steals your child’s identity. Child identity theft occurs when someone steals a minor’s private information to open lines of credit, obtain loans or claim benefits in a child’s name. Based on data from Safe Home, 73% of child identity theft victims know the person who stole their identity, so it’s important to teach children strong online practices.
Enforce identity verification throughout the employee life cycle using Persona and Okta’s out-of-the-box integration for identity verification. Joshua Rodriguez is a product marketing manager at Persona focused on our Graph product and financial institution and public sector verticals. You'll find him around the Bay Area exploring museums with his wife and young daughter.