Remove Article Remove CTO Remove Security Remove Weak Development Team
article thumbnail

TechCrunch+ roundup: Generative AI for proptech, cloud vendor shopping, cybersecurity fairy tales

TechCrunch

In a guide that delves deeply into best practices for spinning up a cloud strategy, Purighalla examines the challenges and benefits of “cloud monogamy,” compares major providers, and offers tactics that can help developers avoid “analysis paralysis.” What’s wrong with the way they are currently solving this problem?

article thumbnail

Chief Technology Officer: Understanding the Main Tech Person In a Company

Altexsoft

Often considered a tech guru of the company or the smartest programmer in the room, the title of CTO alone indicates that the company is doing something big with technology. With this article, we’ll dip a toe into the field of the multiple responsibilities of an average CTO. The role of CTO.

CTO 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Extra Crunch roundup: Security data lakes, China vs. Starlink, ExtraHop’s $900M exit

TechCrunch

News broke this morning that Bain Capital Private Equity and Crosspoint Capital Partners are purchasing Seattle-based network security startup ExtraHop. Full Extra Crunch articles are only available to members. Network security startup ExtraHop skips and jumps to $900M exit. Have a great week, and thanks for reading!

CTO 163
article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. Cybersecurity teams were no exception.

article thumbnail

Security 2020: Why We See Big Opportunity for Founders Building Developer-Centric Security Startups

Battery Ventures

Cybersecurity remains a huge pain point for many organizations: Last year, a study by incumbent security provider Palo Alto Networks found security teams at large enterprises use more than 130 separate security solutions, on average. How did we get here?

article thumbnail

TechCrunch+ roundup: 3 views on Epic-Bandcamp deal, SPAC letdown, CIO sales strategy

TechCrunch

” Full TechCrunch+ articles are only available to members. Over timer founders and sales teams who adopt this mindful approach can turn customers into assets, says Khan. As war escalates in Europe, it’s ‘shields up’ for the cybersecurity industry. Preparing your team to interact with the code source.

Strategy 199
article thumbnail

Machines won’t replace threat hunters until they master this one skill

Lacework

Even those in the world of cybersecurity are wondering where those boundaries lie. That’s in large part because with the world’s growing focus on cybersecurity, we’re seeing increasingly more threat detection tools with advanced capabilities. What do threat hunters do that cybersecurity tools can’t?