Most people know about OpenAI’s ChatGPT, funded, in part, by a massive infusion of cash from Microsoft. People also are aware of the privacy concerns of GPT-type tools. In many cases, the damage is not intentional, but accidental. People submitting sensitive queries without thinking about it. Also, as more and more software incorporates GPT-tools under […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As U.S. states implement new second-generation privacy laws (there are currently 8 states – can you name all of them?), the rules regarding data retention are changing and you might want to be prepared – unless, of course, you enjoy spending tens of thousands of dollars on lawyers to defend yourself, hours being deposed and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
No sane person can deny the allure of Generative Pre-trained Transformer AIs. Smart people are also concerned about the security risks they create. For example, if you use an AI to write code, could the AI include a back door? Or malware? How do you know without reviewing every line of code in detail? In […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Arkansas Becomes First State to Ban Minors from Social Media Without Parental Permission It is now illegal for anyone in Arkansas to be on social media without parental permission if they are under 18. Do you think this will actually stop anyone? If you do, I have a bridge in Brooklyn that is for sale. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cybersecurity and privacy are a key pillar of every company’s risk governance program – or at least should be. Alicja Cade, Director, Financial Services, Office of the CISO, Google Cloud suggests some questions Boards and CEOs should be asking about the company’s cybersecurity program. Here are some questions that she is recommending the Board gets […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Today the FBI arrested the person they say leaked hundreds of classified documents on US surveillance related to the war in Ukraine. The impact of this leak may rise to the level of the damage caused by Edward Snowden in 2013. They continue to find more classified documents as the investigation continues. What is different […]
Continue reading →
[DISPLAY_ACURAX_ICONS]