article thumbnail

Secured by Women: Meet Rinki Sethi, VP and CISO at BILL

Lacework

Women’s representation in cybersecurity has come a long way in the last decade, but we still have progress to make before the balance truly shifts. That’s exactly why Lacework launched Secured by Women last year; and now, we’re thrilled to be back to continue championing the incredible women making a difference in cybersecurity.

article thumbnail

PocketLaw, a contract automation SaaS for SMEs, secures Atomico’s support

TechCrunch

The round brings the startup’s total raised since being founded back in 2018 to €14M. The Series A funding will go on expanding its operations across Europe, including by growing its team across legal, technical, and operational areas to support the growth sprint, it added. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Is Compliance Reporting and What Are Its Benefits?

Kaseya

Compliance reports typically include information on how customer/company data is dealt with – how it is controlled or protected, obtained and stored, and how it is secured and distributed internally and externally. It is often the IT department’s responsibility to generate these reports.

article thumbnail

Stop the Presses: Media Coverage as a Prioritization Metric for Vulnerability Management

Tenable

In technical circles, vulnerabilities have always been news. 2018 was a big year for vulnerabilities in the media. Through the course of doing broad-scope interviews with CISOs and security analysts, we were sure to ask about their experiences with vulnerabilities in the news. So we asked them. Here’s what we learned.

Media 77
article thumbnail

Hiring Success 2018: All The Confirmed Speakers Attending HR Tech’s Next Big Event

CTOvision

SmartRecruiters’ Hiring Success 2018 is already set to be the defining HR and recruitment conference of the year. Tigran is the co-founder of CodeFights, a San Francisco start-up which aims to discover, build and and promote technical talent through core game mechanics. John Sumser – Principle Analyst – HRExaminer.

article thumbnail

Apiumhub among top IT industry leaders in Code Europe event

Apiumhub

This year you will have 6 unique tracks: Cloud Computing: IaaS, PaaS, SaaS DevOps: Microservices, Automation, ASRs Cybersecurity: Threats, Defenses, Tests Data Science: ML, AI, Big Data, Business Analytics Programming languages: C++, Python, Java, Javascript,Net Future & Inspire: Mobility, 5G data networks, Diversity, Blockchain, VR.

article thumbnail

New sexual-assault allegations against ‘phone phreaker’ John Draper

The Parallax

How the myth of meritocracy stymies women in cybersecurity. Facebook, EFF security experts sound off on protecting the vulnerable. He invited in Jay, who was still hoping to discuss technical topics in-depth. ”—Leigh Honeywell, adviser, Ada Initiative. READ MORE ON TRENDS IN HACKER CULTURE.