article thumbnail

Cloud-native cybersecurity startup Aqua Security raises $60M and remains a unicorn

TechCrunch

Aqua Security, an Israeli cybersecurity startup that helps companies protect their cloud services, has raised $60 million in funding, extending its previously announced $135 million Series E round of funding to $195 million.

Cloud 294
article thumbnail

Top 8 ways to improve cybersecurity for your organization

CIO

As you plan your security budget, know that your recommendations to improve cybersecurity will be scrutinized more than ever before. We can’t forget every CISO’s favorite: “ How much will this reduce our cybersecurity risk? ” You’ll have to make tough choices among cybersecurity methods, tools, and techniques.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mastercard preps for the post-quantum cybersecurity threat

CIO

Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. To prepare for this worst-case scenario, Mastercard launched its Quantum Security and Communications project, which earned the company a 2023 US CIO 100 Award for IT innovation and leadership.

Security 347
article thumbnail

What is AI’s current impact on cybersecurity?

CIO

The pervasive integration of AI, particularly ChatGPT and large language models (LLMs), into the cybersecurity landscape. The increasingly widespread use of artificial intelligence has another critical consideration: potential security exposures within enterprises. Threat Vector is your compass in the world of cybersecurity.

article thumbnail

Start Taking Your Embedded Partnerships Seriously

But if everyone knows that the development team is the lifeblood of your application and company, why are they often saddled with embedded technologies they don’t enjoy using? That means easy embedding, data integrations, seamless automation, total security, and much more. Choosing the right embedded partner matters.

article thumbnail

6 common challenges facing cybersecurity teams and how to overcome them

TechCrunch

More posts by this contributor Time to trust: Questions cybersecurity customers ask and how to answer them 4 ways cybersecurity startups can boost adoption and shorten time to value Building products and companies in cybersecurity is not an easy task because in many ways, the industry behaves differently from others.

Security 246
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO

At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity. Protecting the Enterprise So, what can security professionals do to properly safeguard the use of Generative AI tools by their employees?

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. All of these stats beg the question, “Do you know what’s in your software?” Register today! November 14th, 2023 at 9:30am PST, 12:30pm EST, 5:30pm GMT

article thumbnail

The Modern Encryption Software Checklist: The Secret to Understanding Your Data Security Needs

Understanding your data security needs is tough enough, but what can be even more difficult is choosing the right software to fit your company. User authentication and advanced security factors. Fortunately, there is a solution. Key management system. Enterprise features. Flexibility and scalability.

article thumbnail

Recovering from a Cyber Attack

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

If your organization stores data and is connected to the Internet, it is not a matter of “if” a cyber-security incident will happen, but “when.” It takes an organizational mindset which realizes that data privacy and security is a continuous, evolving process, as opposed to a “fire-and-forget” set of steps.

article thumbnail

Build Trustworthy AI With MLOps

In our eBook, Building Trustworthy AI with MLOps, we look at how machine learning operations (MLOps) helps companies deliver machine learning applications in production at scale. Our eBook covers the importance of secure MLOps in the four critical areas of model deployment, monitoring, lifecycle management, and governance.

article thumbnail

The Ultimate Embedded Analytics Guide

To capitalize on the value of their information, many companies today are taking an embedded approach to analytics and delivering insights into the everyday workflow of their users through embedded analytics and business intelligence (BI). Share data and insights securely.

article thumbnail

Achieving Elite and High Performance DevOps Using DORA Metrics

Speaker: Nico Krüger, Senior Director of Solutions Engineering at Rollbar

Companies that use the Continuous Code Improvement approach have a compact feedback loop that tells them when there’s a code issue that needs to be fixed, fixes it, then goes back to writing and running code. Build in security from the start. Improve the stability of your software.

article thumbnail

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

article thumbnail

Make Payment Optimization a Part of Your Core Payment Strategy

Everything you need to know about payment optimization – an easy-to-integrate, PCI-compliant solution that enables companies to take control of their PSPs, minimize processing costs, maximize approval rates, and keep control over their payments data.