article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

Security 242
article thumbnail

Vanta lands $40M to automate cybersecurity compliance

TechCrunch

Vanta , a security compliance automation startup, today announced that it raised $40 million in an extension of its Series B funding round that closed in June, which valued the company at $1.6 Cacioppo founded Vanta in 2016 to — in her words — “help companies achieve and maintain a strong security posture.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

For startups, trustworthy security means going above and beyond compliance standards

TechCrunch

Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief information security officer at a SaaS company and a public financial institution. So why is compliance alone not enough?

Security 345
article thumbnail

What’s the state of Zero Trust security?

CIO

Zero Trust adoption is accelerating, with over half of organizations reporting they have adopted Zero Trust Security, according to research independently conducted by leading security research firm Ponemon Institute, sponsored by Hewlett Packard Enterprise. What’s driving the adoption of Zero Trust Security?

Study 246
article thumbnail

CIOs eager to scale AI despite difficulty demonstrating ROI, survey finds

CIO

CIOs rank AI as a top priority alongside cybersecurity for IT departments. However, barriers such as adoption speed and security concerns hinder rapid AI integration, according to a new survey. There is a sense of urgency to leverage AI effectively, but adoption speed and security challenges are hindering efforts.

Survey 318
article thumbnail

3 data security disciplines to drive AI innovation

CIO

Unsurprisingly, the more data that is stored, accessed, and processed across different cloud architectures that typically also span different geographic jurisdictions, the more security and privacy risks arise. Securing from AI : Just like most new technologies, artificial intelligence is a double-edged sword.

article thumbnail

Study: 30% of Log4Shell instances remain unpatched

TechCrunch

Mehul Revankar is a cybersecurity professional with over 15 years of experience in vulnerability management, policy compliance and security operations. Cybersecurity and Infrastructure Security Agency director Jen Easterly noted that Log4Shell is the “most serious” vulnerability she has witnessed in her decades-long career.

Study 219