article thumbnail

H1 2022 cybersecurity product-led growth market map

TechCrunch

It’s no different in the cybersecurity space. To find out, I analyzed more than 800 products from over 600 vendors using information from open sources, including Google, Gartner, CB Insights and startup/vendor lists from different sources. The below map summarizes the state of product-led growth in the cybersecurity industry.

Security 242
article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 185
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

With 2022 now in our rearview mirror, we still reflect on a time marked by global upheavals, like the Russia – Ukraine war, to the skyrocketing energy prices and global inflation. While these technologies aren’t complete fixes to the problem, they do offer an extra layer of security to protect our vital infrastructure.

article thumbnail

Cybersecurity Snapshot: Key 2022 Data for Cloud Security, Vulnerability Management, EASM, Web App Security and More

Tenable

As 2022 ends, we highlight important data points that shine a light on the trends, challenges and best practices that matter to cybersecurity leaders eager to boost their exposure management and reduce their organizations’ cyber risk. . Dive into six illuminating cybersecurity research findings of 2022.

Cloud 98
article thumbnail

Discover How Senior Technology Leaders Can Secure the Budget That They Need

Speaker: Kevin Goldsmith, Chief Technology Officer at Anaconda | Peyman Pouryekta, CEO and Technology Advisor | Bob Webber, VP Product Flow Optimization, Construx

In order to successfully instruct and manage their teams, they must know how to evaluate tools, advocate for resources, and allocate them to the appropriate teams. February 24, 2022 at 11:00 am PST, 2:00 pm EST, 7:00 pm GMT By the end of this session you will learn how to: Strategically invest in technology. Address budgetary concerns.

article thumbnail

To bring PLG to cybersecurity, let’s change our hiring habits

TechCrunch

H1 2022 cybersecurity product-led growth market map. For product-led growth to become commonplace in cybersecurity, there needs to be enough product talent with the right mindset and level of maturity required for PLG. The inherent complexity of cybersecurity makes it harder for outsiders to hit the ground running quickly.

article thumbnail

How Zero Trust can help align the CIO and CISO

CIO

The role of the CIO (Chief Information Officer) and CISO (Chief Information Security Officer) have become increasingly important in recent years as organizations place more emphasis on digital transformation and information security. billion in 2022. The recent executive order signed by the U.S.