article thumbnail

Elisity raises $26M Series A to scale its AI cybersecurity platform

TechCrunch

Elisity , a self-styled innovator that provides behavior-based enterprise cybersecurity, has raised $26 million in Series A funding. Bring CISOs into the C-suite to bake cybersecurity into company culture. ” Founded in 2018, Elisity — whose competitors include the likes of Vectra AI and Lastline — closed a $7.5

article thumbnail

Secured by Women: Meet Rinki Sethi, VP and CISO at BILL

Lacework

Women’s representation in cybersecurity has come a long way in the last decade, but we still have progress to make before the balance truly shifts. That’s exactly why Lacework launched Secured by Women last year; and now, we’re thrilled to be back to continue championing the incredible women making a difference in cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Driving 15 years of IT transformation in 5

CIO

In 2018, the day after his employer publicly announced it was being acquired, Lynn Lovelady, then VP of IT at Energen, received a pivotal phone call that would reshape his career. IT Leadership, IT Strategy, Manufacturing Industry IT’s seat at the table has been cemented for many reasons. Don’t breach that trust, and you’ll go far.”

Security 279
article thumbnail

Security Theater: Don’t Hang your Hat on Compliance

Prisma Clud

Security breaches can cost millions. They’re going to want to know how security teams are protecting their infrastructure. Prologue : Intro to Security Theater Security theater. Security theater is essentially the illusion of security. Security theater is essentially the illusion of security.

article thumbnail

The Countdown to DORA

CIO

In fact, one of the world’s most far-reaching cybersecurity regulations for financial services and their supply chains is a done deal. It’s designed to strengthen the security of EU financial firms, such as banks, insurance companies, investment firms and more, by imposing resilience requirements and regulating the supply chain.

Security 264
article thumbnail

Bipartisan Cybersecurity Legislation — Continuing the Progress in 2022

Palo Alto Networks

Fortunately, the strong bipartisan consensus on cybersecurity threats has led to bipartisan interest in cybersecurity legislation. With the 2022 legislative calendar now in full swing, we see cybersecurity policy activity coalescing around several worthwhile pillars of activity. You can’t secure what you can’t see.

article thumbnail

Improving Security by influencing Human Behavior

Xebia

We all know that the hardening of a system or implementing 2FA does not magically improves the security of an organisation. Also for the successful improvement of security in your organisation, a holistic approach is needed. Implementing and improving security demands your approach to cover both people, process and technology.

Agile 130