article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 132
article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. 1 - Multinational cyber agencies issue best practices for secure AI deployment Looking for best practices on how to securely deploy artificial intelligence (AI) systems? And don’t miss the latest CIS Benchmarks updates.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

14 in-demand cloud roles companies are hiring for

CIO

After marked increase in cloud adoption through the pandemic, enterprises are facing new challenges, namely around the security, maintenance, and management of cloud infrastructure. These IT pros can also help organizations avoid potential risks around cloud security, while ensuring a smooth transition to the cloud across the company.

Cloud 285
article thumbnail

10 most difficult-to-fill IT roles — and how to address the gap

CIO

The CIO’s biggest hiring challenge is clear: “There is simply not enough talent to go around,” says Scott duFour, global CIO of business payments company Fleetcor, for whom positions in areas such as AI, cloud architecture, and data science remain the toughest to fill. The net result? million professionals. million professionals.

article thumbnail

Cybersecurity Snapshot: New Guide Explains How To Assess If Software Is Secure by Design, While NIST Publishes GenAI Risk Framework

Tenable

Is the software your company wants to buy securely designed? 1 - How to assess if a tech product is secure by design Buying a securely designed digital product can lower your risk of breaches, simplify cyber defense efforts and reduce costs. A new guide outlines how you can find out. And much more!

article thumbnail

7 sins of digital transformation

CIO

“To meet digital transformation goals, companies must build structural ambidexterity, focus on short-term efficiency opportunities that fit the current structure and model, but also pursue medium- to long-term discontinuous expansion opportunities in business that potentially would require structural and cultural changes,” Senan advises.

article thumbnail

Technical Feasibility in Software Engineering: Things to Consider Before Development Starts

Altexsoft

The authorities admitted that the previous 2024 deadline for human landing “ was not grounded on technical feasibility.”. Technical feasibility inspects whether software can be built at all with available tools and experts. In this article, we’ll concentrate on the technical side of feasibility that is our immediate area of expertise.