{"id":109497,"date":"2025-09-10T04:44:38","date_gmt":"2025-09-10T04:44:38","guid":{"rendered":"https:\/\/x-phy.com\/?p=109497"},"modified":"2025-09-30T05:27:33","modified_gmt":"2025-09-30T05:27:33","slug":"fix-the-risk-dont-ban-the-tool-how-to-secure-genai-at-work","status":"publish","type":"post","link":"https:\/\/x-phy.com\/fix-the-risk-dont-ban-the-tool-how-to-secure-genai-at-work\/","title":{"rendered":"Fix The Risk, Don\u2019t Ban The Tool: How To Secure GenAI At Work"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">GenAI is transforming the way we work &#8211; making everyday tasks faster and more efficient.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But with convenience comes hidden risks. Employees may unknowingly expose sensitive corporate data when using GenAI tools, creating new avenues for insider threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a recent Forbes Technology Council article, our CEO &amp; Co-founder Camellia Chan explains why the solution is not to ban GenAI in the workplace. Instead, organisations need to fix the risks, not the tool.<\/span><\/p>\n<h3><b>Key Highlights from the Article<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Shadow AI creates insider threats:<\/strong><span style=\"font-weight: 400;\"> Well-intentioned employees often use GenAI on personal accounts, but this \u201cshadow AI\u201d usage can leak sensitive data outside IT\u2019s visibility.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><strong>Traditional defenses fall short:<\/strong><span style=\"font-weight: 400;\"> Software-based tools like DLP and behavioral analytics are essential, but they can miss risks &#8211; especially when compromised credentials make malicious activity look legitimate.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Hardware-level zero trust is the missing piece: <\/b><span style=\"font-weight: 400;\">Embedding security directly at the physical layer, within the memory storage, enables autonomous, real-time defense. By detecting unusual activity such as mass data transfers &#8211; even after a breach &#8211; hardware-level security stops threats before data escapes.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>A holistic strategy is needed:<\/b><span style=\"font-weight: 400;\"> The path forward is not banning GenAI but creating a GenAI-aware security strategy that blends governance, employee education, monitoring, and hardware-based protection.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Explore how X-PHY brings this vision to life with our patented AI-embedded hardware security solutions, available now on our<\/span><a href=\"https:\/\/estore.x-phy.com\"> <span style=\"font-weight: 400;\">X-PHY eStore<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read the Full Article: <\/span><a href=\"https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2025\/09\/08\/fix-the-risk-dont-ban-the-tool-how-to-secure-genai-at-work\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Fix the Risk, Don\u2019t Ban the Tool: How To Secure GenAI At Work<\/span><\/a><span style=\"font-weight: 400;\"> on Forbes.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>GenAI is transforming the way we work &#8211; making everyday tasks faster and more efficient.\u00a0 But with convenience comes hidden risks. Employees may unknowingly expose sensitive corporate data when using [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":109499,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[14,15],"tags":[],"class_list":["post-109497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-media","category-trends-and-developments"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/109497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=109497"}],"version-history":[{"count":3,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/109497\/revisions"}],"predecessor-version":[{"id":109502,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/109497\/revisions\/109502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/109499"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=109497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=109497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=109497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}