article thumbnail

For startups, trustworthy security means going above and beyond compliance standards

TechCrunch

Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief information security officer at a SaaS company and a public financial institution. Oren Yunger. Contributor. Share on Twitter.

Security 345
article thumbnail

Optimizing PCI compliance in financial institutions

CIO

In the fast-evolving world of finance, data security is of paramount importance. Financial institutions must ensure the protection of sensitive personal information, most commonly payment card data, to maintain, trust and meet various regulatory requirements. This is where a Common Controls Assessment (CCA) can play a pivotal role.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Implications of generative AI for enterprise security

CIO

So, what are its implications for the enterprise and cybersecurity? It is a scientific and engineering game-changer for the enterprise. The cybersecurity challenges Generative AI, including ChatGPT, is primarily delivered through a software as a service (SaaS) model by third parties.

article thumbnail

Top 5 Security Trends for CIOs

CIO

With every such change comes opportunity–for bad actors looking to game the system. Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins.

Trends 302
article thumbnail

Exploring the pros and cons of cloud-based large language models

CIO

However, cloud-native application development can pose significant security risks as developers are often dealing with exponentially more cloud assets across multiple execution environments. Filter Bypass: LLM tools are typically built with security filters to prevent the models from generating unwanted content. Cloud Computing

article thumbnail

Living Security raises $14M for predictive human risk management

TechCrunch

Cybersecurity training is one of those things that everyone has to do but not something everyone necessarily looks forward to. Living Security is an Austin-based startup out to change cybersecurity training something you look forward to, not dread. The cybersecurity industry needs to reinvent itself.

Security 215
article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 131