article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 241
article thumbnail

For startups, trustworthy security means going above and beyond compliance standards

TechCrunch

Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief information security officer at a SaaS company and a public financial institution. So why is compliance alone not enough?

Security 345
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Optimizing PCI compliance in financial institutions

CIO

In the fast-evolving world of finance, data security is of paramount importance. Financial institutions must ensure the protection of sensitive personal information, most commonly payment card data, to maintain, trust and meet various regulatory requirements. This is where a Common Controls Assessment (CCA) can play a pivotal role.

article thumbnail

What is GRC? The rising importance of governance, risk, and compliance

CIO

As a result, managing risks and ensuring compliance to rules and regulations along with the governing mechanisms that guide and guard the organization on its mission have morphed from siloed duties to a collective discipline called GRC. What is GRC? GRC is overarching.

article thumbnail

CISOs are not just the keepers of our data – they must be its custodians

CIO

According to Deep Instinct’s research , 75% of security professionals observed an increase in cyberattacks in 2023, with 85% of them attributing the rise to generative AI. Changes to social expectations surrounding privacy have led to individuals wanting transparency and security from the entities that collect and process our data.

Data 299
article thumbnail

H1 2022 cybersecurity product-led growth market map

TechCrunch

It’s no different in the cybersecurity space. To find out, I analyzed more than 800 products from over 600 vendors using information from open sources, including Google, Gartner, CB Insights and startup/vendor lists from different sources. The below map summarizes the state of product-led growth in the cybersecurity industry.

Security 242
article thumbnail

Security Theater: Don’t Hang your Hat on Compliance

Prisma Clud

Security breaches can cost millions. They’re going to want to know how security teams are protecting their infrastructure. Prologue : Intro to Security Theater Security theater. Security theater is essentially the illusion of security. Security theater is essentially the illusion of security.