Enterprise Content Management

While organisations recognise the importance of artificial intelligence governance, most lack the processes to implement it effectively, creating significant security vulnerabilities and compliance challenges, according to a survey by Anaconda Inc.

Workers at 90 per cent of companies are using personal AI chatbots for daily tasks without IT approval, creating significant governance and security risks, according to a new MIT study.

Cybercriminals are using two previously undocumented techniques to help malicious QR codes evade email security systems, according to research published by Barracuda Networks.

The UK's groundbreaking ban on ransomware payments for government and critical infrastructure will take effect within months, while Australia and New Zealand will continue to rely on reporting requirements rather than payment prohibitions.

Enterprise software giant OpenText has removed Mark Barrenechea as CEO and CTO after 13 years, appointing interim leadership as the company explores selling "non-core assets" following disappointing financial results.

Dell Technologies has updated its AI Data Platform with a new unstructured data engine developed through a partnership with search specialist Elastic, targeting enterprises struggling to harness unstructured data for artificial intelligence applications.

Data security platform BigID has launched four new AI governance capabilities designed to help organisations discover unauthorised AI models and control sensitive data use in artificial intelligence systems.

​Delinea has launched Iris AI, an artificial intelligence engine that automates identity security decisions and auditing processes for enterprise IT systems.

In a controversial decision that has sparked widespread criticism, the UK's data protection regulator, the Information Commissioner's Office (ICO), announced that it would not take enforcement action against the Ministry of Defence.

Researchers from Carnegie Mellon University have demonstrated that large language models can autonomously plan and execute sophisticated cyberattacks on enterprise-grade network environments without human intervention.

Pages