Trust in GenAI is waning
Last year, German companies were unimpressed by the security risks of ChatGPT and the like. They trusted the promising Generative AI applications (GenAI) and their advantages unconditionally.
Last year, German companies were unimpressed by the security risks of ChatGPT and the like. They trusted the promising Generative AI applications (GenAI) and their advantages unconditionally.
Companies are currently facing a wave of new regulations in the area of IT security.
These developments are a reaction to the increasing threats posed by cyber attacks and the growing importance of securing networks and infrastructures.
The competent authority imposes a fine in the millions because the US transport service provider is alleged to have violated European data regulations when transferring personal data.
But the dispute continues.
Thousands of industrial control systems (ICS) in the USA and the UK are vulnerable to cyber attacks. Critical infrastructure, such as the water supply, is also affected.
Tobias Pföhler from StorMagic comments on VMware's renewed OEM agreements with Dell, HPE, and Lenovo – and why competitors are positioning themselves.
Sorting receipts, filing documents, maintaining Excel spreadsheets: In 10 years' time, these routine activities will hardly play a role in the AI-influenced everyday life of accounting.
What does this change mean for the job profile?
What opportunities and risks will arise?
Android users should beware of the new BingoMod malware.
This disguises itself as a security app and can steal money, delete data and completely take over the infected device.
Comprehensive and correct classification is fundamental for data security. Only if you know which data is (particularly) worth protecting can you implement appropriate measures. This is all the more important in times of AI assistants such as Microsoft Copilot.
The generative AI (GenAI) revolution began over a year and a half ago, and there's no end in sight. Every time the euphoria subsides, a new model with exciting features and possibilities emerges, reigniting enthusiasm, such as OpenAI's Sora.
Access certification describes the independent review of access rights by an auditor.
The auditor examines whether the rights granted to users are really necessary.