article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

Back in 2001, as I was just entering the venture industry, I remember the typical VC reaction to a start-up pitch was, “Can’t Microsoft replicate your product with 20 people and a few months of effort, given the resources they have?” Artificial intelligence (AI) in 2023 feels a bit like déjà vu to me.

Security 342
article thumbnail

What Executives Should Know About Shift-Left Security

CIO

Shift-left security” is the concept that security measures, focus areas, and implications should occur further to the left—or earlier—in the lifecycle than the typical phases that used to be entry points for security testing and protections. How did the term shift-left security originate?

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity 2030

Haft of the Spear

Discussions about cybersecurity overwhelmingly focus on the recent, which are our responses to the design and engineering decisions of the past. Yet in cybersecurity [1] the path towards a brighter future is rarely discussed. To parahprase William Gibson, this cybersecurity future is already here, it is just not evenly distributed.

article thumbnail

A Practical History of the Firewall – Part 2: The Value of Management

Firemon

The Check Point Policy Editor The Check Point Central Object Repository Central Logging Multi-Domain Management and OPSEC Cisco and the CLI were a Dominant Player Book a Demo Jody Brazil CEO at FireMon Check Point and stateful inspection firewalls won the early battle against proxy firewalls ( Part 1: Early Days ).

article thumbnail

Cyber Canon Book Review: Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Palo Alto Networks

Cyber Canon Book Review: “Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time,” 2018, by O. Bottom Line: I recommend this book for the Cybersecurity Canon Hall of Fame. In “ Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time ,” author O. Sami Saydjari.

article thumbnail

Technology Trends for 2024

O'Reilly Media - Ideas

Before that, cloud computing itself took off in roughly 2010 (AWS was founded in 2006); and Agile goes back to 2000 (the Agile Manifesto dates back to 2001, Extreme Programming to 1999). Security Almost all branches of security showed growth from 2022 to 2023. 2023 was one of those rare disruptive years. That’s just a start.

Trends 116