article thumbnail

For startups, trustworthy security means going above and beyond compliance standards

TechCrunch

Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief information security officer at a SaaS company and a public financial institution. So why is compliance alone not enough?

Security 345
article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. Cybersecurity budgets are typically caught between these two forces.

Trends 317
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What is GRC? The rising importance of governance, risk, and compliance

CIO

As a result, managing risks and ensuring compliance to rules and regulations along with the governing mechanisms that guide and guard the organization on its mission have morphed from siloed duties to a collective discipline called GRC. What is GRC? GRC is overarching.

article thumbnail

PHP Security and Compliance: Trends to Watch in 2024

Zend

PHP security and compliance are top concerns in 2024. Explore upcoming PHP security trends as we discuss findings from our most recent PHP Landscape Report.

PHP 57
article thumbnail

H1 2022 cybersecurity product-led growth market map

TechCrunch

It’s no different in the cybersecurity space. To find out, I analyzed more than 800 products from over 600 vendors using information from open sources, including Google, Gartner, CB Insights and startup/vendor lists from different sources. The below map summarizes the state of product-led growth in the cybersecurity industry.

Security 242
article thumbnail

Security Theater: Don’t Hang your Hat on Compliance

Prisma Clud

Security breaches can cost millions. They’re going to want to know how security teams are protecting their infrastructure. Prologue : Intro to Security Theater Security theater. Security theater is essentially the illusion of security. Security theater is essentially the illusion of security.

article thumbnail

3 data security disciplines to drive AI innovation

CIO

AI hype and adoption are seemingly at an all-time high with nearly 70% of respondents to a recent S&P report on Global AI Trends saying they have at least one AI project in production. Securing the AI model itself means identifying model risks, over-permissive access, and data flow violations throughout the AI pipeline.