The Silent Risk in Government AI — Shadow Models Are Already at Work
Shadow AI is already at work. But leaders can turn hidden risk into innovation by launching AI amnesty programs andcentral model registries.
Shadow AI is already at work. But leaders can turn hidden risk into innovation by launching AI amnesty programs andcentral model registries.
In this video interview, Cloudera’s Carolyn Duby discusses how agencies can bring better discipline to managing their cyber data and using it to strengthen their defenses.
NIST’s new SA-24 control sets formal requirements for cyber resiliency, but fails to address the leadership, cultural, and organizational dynamics needed.
In this video interview, Matthew Shallbetter at Armis explains how CDM data modernization could reshape cyber efforts.
In this video interview, Commvault’s Richard Breakiron discusses data resiliency and explains how agencies can develop a clear understanding of their data assets and leverage automation and AI to derive insights.
By 2030, trusted digital government will rest on the convergence of DPI rails, quantum-safe cryptography, and wallet-based identity. Time to get ready.
Federal healthcare organizations hold a wealth of personal health information that’s often vital to carry out national security, readiness, and disaster response efforts. Unfortunately, that also makes these agencies prime targets for both criminal and nation-state adversaries. Let’s take a look at common pain points agencies might experience while trying to protect their data: •Read… Read more »
Edge devices and IoT are different yet they share similar security concerns when considering the data within your network.
There’s a growing cybersecurity skills gap between IT and operational technology (OT). But OT security is critical and needs more attention.
Identity proofing, or identity verification, refers to the process of gathering data and analyzing signals to confirm an individual’s identity and assess the risk of conducting a transaction with them. Many individuals have extensive digital trails, making it easy to verify their identities with a high level of confidence. But think about younger individuals whoRead… Read more »