Remove products
article thumbnail

H1 2022 cybersecurity product-led growth market map

TechCrunch

Ross Haleliuk is a venture capitalist and head of product at LimaCharlie.io. Product-led growth is one of the most commonly discussed topics in the startup world as the market cap of public companies utilizing the growth tactic skyrocketed in recent years. It’s no different in the cybersecurity space.

Security 242
article thumbnail

3 key metrics for cybersecurity product managers

TechCrunch

Ross Haleliuk Contributor Share on Twitter Ross Haleliuk is an investor and head of product at LimaCharlie.io. Anyone who has read product management books, attended workshops or even simply gone through an interview, knows that what is not measured cannot be managed. The practice of product management is, however, much more nuanced.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

6 common challenges facing cybersecurity teams and how to overcome them

TechCrunch

Ross Haleliuk Contributor Share on Twitter Ross Haleliuk is an investor and head of product at LimaCharlie.io. To start, it is very crowded, with hundreds and thousands of undifferentiated solutions promising to solve all security problems and more often than not, falling short of their promises.

Security 246
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO

At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity. Protecting the Enterprise So, what can security professionals do to properly safeguard the use of Generative AI tools by their employees?

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Overlooking Security Considerations. Managing Delete Heavy Workloads. Running Unoptimized Queries. Neglecting Anti-Entropy Repairs. Tuning Without Proper Understanding. Leaving Cassandra Unattended.

article thumbnail

3 business benefits of stronger security using Zero Trust principles

CIO

Operational technology (OT) organizations face increasing challenges when it comes to cybersecurity. While time is of the essence for companies in this transformation process, cybersecurity must not be an afterthought. And stronger cybersecurity isn’t just a necessity; it also makes economic sense. As Industry 4.0 As Industry 4.0

IoT 306
article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

Back in 2001, as I was just entering the venture industry, I remember the typical VC reaction to a start-up pitch was, “Can’t Microsoft replicate your product with 20 people and a few months of effort, given the resources they have?” Twenty-two years later, Microsoft is at the table once again.

Security 339
article thumbnail

The Essential Guide to Analytic Applications

We interviewed 16 experts across business intelligence, UI/UX, security and more to find out what it takes to build an application with analytics at its core. No matter where you are in your analytics journey, you will learn about emerging trends and gather best practices from product experts.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter.

article thumbnail

Iterate Your Way to a Top Analytics Product Experience

Speaker: Richard Cheng, Associate Product Manager, Mark43

To fix traditionally paper-heavy and error-prone processes, they needed a secure and easy-to-use product experience that simplified and unified crime data collection and management. Haarthi Sadasivam, Technical Product Marketing Manager at Looker will join the conversation on best practices.

article thumbnail

It's Alive! Bringing Your Product Roadmap Back From the Dead

Speaker: Lisa Mo Wagner, Product Management Coach, Writer, Speaker and WomenTech Ambassador

Timeline roadmaps provide us with a false sense of certainty and security. Often, product teams fall into the trap of creating a roadmap that doesn’t support timely customer feedback. Companies frequently make this mistake by creating a product roadmap 1-3 years in advance. How to Manage your product roadmap.

article thumbnail

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. He’ll explain how stitching together pre-existing solutions is often the best way to bring a stable, secure product to market most quickly.

article thumbnail

Build Trustworthy AI With MLOps

Whether it is the reliability of the supply chain, the accuracy of financial predictions, or the assurance of product availability, trust from customers, vendors, and suppliers is non-negotiable. Our eBook covers the importance of secure MLOps in the four critical areas of model deployment, monitoring, lifecycle management, and governance.