Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

C-suite leaders break their own AI rules

By CIO Dive by By CIO Dive
November 13, 2025
Home Enterprise IT
Share on FacebookShare on Twitter


This audio is auto-generated. Please let us know if you have feedback.

Dive Brief:

  • Enterprises created AI guidelines and policies, but not everyone is following the rules, according to research commissioned by Nitro. The software company analyzed more than 1,000 responses from C-suite leaders and employees.
  • More than two-thirds of C-suite executives admitted using unapproved AI tools at work in the past three months. Of those, more than one-third used unapproved tools at least five times during the last quarter. More than half rated security and compliance as “challenging” or “extremely challenging” when implementing AI.
  • Employees also ignore established standards around AI tools. One in three workers confessed to using AI to process confidential company information.

Dive Insight:

AI sprawl is taking over the workplace as the rush to adopt the technology leads to a proliferation of tools and platforms without a unifying strategy. 

Shadow AI is one of the driving forces behind the trend, bringing with it a set of security implications. Around 20% of organizations that suffered a breach traced it back to shadow AI, with the global average cost surpassing $4 million, according to an IBM survey. 

Executives and employees are guilty of turning to unauthorized AI tools. Some see it as a way to circumvent arduous approval processes that stand in the way of speed. 

“If your competitors are using AI to accelerate content production right now, waiting for the approved stack means losing ground every day,” Cormac Whelan, CEO at Nitro, told CIO Dive in an email. “They’ve made a calculated decision that asking for forgiveness beats explaining why they sat on the sidelines waiting for compliance.”

C-suite leaders have a similar inclination, surveys like Nitro’s show. CalypsoAI, for example, found that more than two-thirds admitting they’d use AI to make their job easier even if it conflicted with internal policies. 

Shadow AI can also be a symptom of poor tooling. After all, three-quarters of employees say they abandon AI tools mid-task, usually due to accuracy concerns, according to an Udacity survey. 

Tools that aren’t useful don’t get used, wasting valuable resources amid runaway AI costs. 

“It’s a wake-up call,” Whelan said in an email. “Adoption is earned, not mandated.”



Source link

By CIO Dive

By CIO Dive

Next Post
Qualcomm To Bring Custom CPU Used For Snapdragon X Chips To Industrial PCs

Qualcomm To Bring Custom CPU Used For Snapdragon X Chips To Industrial PCs

Recommended.

The Licel vTEE earns second consecutive EMVCo security approval for iOS

The Licel vTEE earns second consecutive EMVCo security approval for iOS

November 27, 2025
Delivery comms, intelligent fulfilment, and AI’s growing influence | Computer Weekly

Delivery comms, intelligent fulfilment, and AI’s growing influence | Computer Weekly

March 4, 2026

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio