article thumbnail

Which open source startups rocketed in 2022?

TechCrunch

A new report shines a light on the world of commercial open source software (COSS) startups, including which ones are growing fastest, which are raising cash and even which universities are most popular among COSS founders. Runa previously backed a number of companies with open source foundations such as Nginx , MariaDB and N8n.

article thumbnail

4 ways CISOs can manage AI use in the enterprise

CIO

Over the summer, I wrote a column about how CIOs are worried about the informal rise of generative AI in the enterprise. Since then, many CIOs I’ve spoken with have grappled with enterprise data security and privacy issues around AI usage in their companies. That column may have been the understatement of the year.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Executives Should Know About Shift-Left Security

CIO

Shift-left security” is the concept that security measures, focus areas, and implications should occur further to the left—or earlier—in the lifecycle than the typical phases that used to be entry points for security testing and protections. How did the term shift-left security originate? This creates risks.

Security 130
article thumbnail

The AI continuum

CIO

It provides smart applications for translation, speech-to-text, cybersecurity monitoring and automation. Retrain and fine-tune an existing model Retraining proprietary or open-source models on specific datasets creates smaller, more refined models that can produce accurate results with lower-cost cloud instances or local hardware.

article thumbnail

Improving your GitHub repositories security setup by adding the OSSF scorecard action

Xebia

This is a GitHub action that will run the OSSF scorecard checks against your repository to see if you are following best practices, like having a security policy, using a code scanning tool, etc. Using this badge can give your users a quick overview of the security of your repository. Is the repository using a code scanning tool?

article thumbnail

Cybersecurity Snapshot: Cyber Pros Taxed by Overwork, Understaffing and Lack of Support, as Stress Takes a Toll

Tenable

Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. 2 - OT security teams get new adversary-emulation tool Are you tasked with securing your organization’s operational technology (OT) systems?

article thumbnail

How to Choose an OT Cybersecurity Solution Vendor

Tenable

Hint: choose a leader in ICS Security. As cyberattacks in critical infrastructure, such as those on the Colonial Pipeline, make headlines, cybersecurity experts must address the risk that this esoteric environment poses to their company. is a leader. . Tenable.ot Know where you are vulnerable.