article thumbnail

Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit

CIO

Here’s the secret to creating a board presentation on cybersecurity, according to Victor Shadare, head of cybersecurity at the international publishing giant Condé Nast : “The board doesn’t have time to look at detail as such. They want something that’s going to punch them in the face,” he said.

Strategy 286
article thumbnail

Artificial Intelligence in Cybersecurity: Good or Evil?

CIO

Generative AI has taken the world seemingly by storm, impacting everything from software development, to marketing, to conversations with my kids at the dinner table. At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Otterize raises $11.5M to help developers securely connect software services

TechCrunch

Tomer Greenwald, Uri Sarid and Ori Shoshan, software developers by trade, found themselves building and configuring software authentication and authorization mechanisms repeatedly — each time with a different tech stack. But one factor in Otterize’s favor is the heightened spending on cybersecurity, particularly in the enterprise.

Software 211
article thumbnail

Ex-Open AI researcher Jan Leike joins Anthropic amid AI safety concerns

CIO

Jan Leike, a prominent researcher — who recently resigned from OpenAI over safety and governance issues — has joined OpenAI competitor, Anthropic. Leike announced his move on X , stating his new focus will be on “scalable oversight, weak-to-strong generalization, and automated alignment research.”

Research 186
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. During the 2008–2009 Global Financial Crisis (GFC) and subsequent recession, researchers noted that cybercrime rates increased dramatically.

Security 220
article thumbnail

Cybersecurity Snapshot: 6 Best Practices for Implementing AI Securely and Ethically

Tenable

But how can you ensure you use it securely, responsibly, ethically and in compliance with regulations? Check out best practices, guidelines and tips in this special edition of the Tenable Cybersecurity Snapshot! How can the security team contribute to these efforts? We look at best practices for secure use of AI.

article thumbnail

Embedded Analytics Insights for 2024

To better understand the factors behind the decision to build or buy analytics, insightsoftware partnered with Hanover Research to survey IT, software development, and analytics professionals on why they make the embedded analytics choices they do.

article thumbnail

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage. How do you help your engineers get on board with buying instead of building?