article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

Back in 2001, as I was just entering the venture industry, I remember the typical VC reaction to a start-up pitch was, “Can’t Microsoft replicate your product with 20 people and a few months of effort, given the resources they have?” Artificial intelligence (AI) in 2023 feels a bit like déjà vu to me.

Security 341
article thumbnail

What Executives Should Know About Shift-Left Security

CIO

Shift-left security” is the concept that security measures, focus areas, and implications should occur further to the left—or earlier—in the lifecycle than the typical phases that used to be entry points for security testing and protections. How did the term shift-left security originate?

Security 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Improving Security by influencing Human Behavior

Xebia

We all know that the hardening of a system or implementing 2FA does not magically improves the security of an organisation. Also for the successful improvement of security in your organisation, a holistic approach is needed. Implementing and improving security demands your approach to cover both people, process and technology.

Agile 130
article thumbnail

Primer: The next act for security theater

The Parallax

The day after DefCon concluded this year, a prominent cybersecurity researcher and hacker known as the brain behind hacks featured on hit TV show Mr. Robot offered his resignation as the head of its security operations. Why are Androids less secure than iPhones? Security theater. Why current funding to secure U.S.

Hotels 189
article thumbnail

TechCrunch+ roundup: 11 PLG tactics, addressing copycat stigma, ‘unicorn glut’ theory

TechCrunch

“We’ve seen that all before … what’s new-ish (at least since 2001) is the massive overhang of growth investments that will take startups years to grow into,” he wrote. To better manage cybersecurity risk, extend zero-trust principles to third parties. ” The ‘unicorn glut’ theory of startup misery. .”

Windows 219
article thumbnail

Cybersecurity 2030

Haft of the Spear

Discussions about cybersecurity overwhelmingly focus on the recent, which are our responses to the design and engineering decisions of the past. Yet in cybersecurity [1] the path towards a brighter future is rarely discussed. To parahprase William Gibson, this cybersecurity future is already here, it is just not evenly distributed.

article thumbnail

CodeSOD: Years of Success

The Daily WTF

Since launching in 2001, the application had been running in production without any notable problems. The years were hardcoded covering all years between 2001 and 2006. Maybe someone was looking for job security. Way back in late 2006, Cody inherited a Java application.