article thumbnail

Technical Review: A Trusted Look Under the Hood

TechEmpower CTO

Many CEOs of software-enabled businesses call us with a similar concern: Are we getting the right results from our software team? We hear them explain that their current software development is expensive, deliveries are rarely on time, and random bugs appear. What does a business leader do in this situation?

article thumbnail

Codacy nabs $15M to improve code reviews with automation

TechCrunch

Code review is a key step during the software development process — it’s when people check a program by viewing and reading parts of the source code. But despite its importance, not all developers are pleased with the way traditional code reviews work. To date, Codacy has raised $28 million.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. When businesses are struggling due to the recession, there’s a strong temptation to look for ways to cut spending.

Security 261
article thumbnail

Low code/no code tools reap IT benefits—with caveats

CIO

Low-code/no-code visual programming tools promise to radically simplify and speed up application development by allowing business users to create new applications using drag and drop interfaces, reducing the workload on hard-to-find professional developers. So there’s a lot in the plus column, but there are reasons to be cautious, too.

article thumbnail

H1 2022 cybersecurity product-led growth market map

TechCrunch

It’s no different in the cybersecurity space. To find out, I analyzed more than 800 products from over 600 vendors using information from open sources, including Google, Gartner, CB Insights and startup/vendor lists from different sources. Of the 824 products reviewed, 151 can be described as product led.

Security 242
article thumbnail

Cybersecurity Due Diligence: Now a best practice in Merger & Acquisition (M&A)

CTOvision

In a recent post on the Cooley M&A website titled Cybersecurity Diligence in M&A Transactions , Cooley partners Andrew Lustig and Randy Sabett bring clarity to a clear trend in the marketplace: cybersecurity diligence is now a part of the M&A diligence assessment.

article thumbnail

Cybersecurity Snapshot: 6 Best Practices for Implementing AI Securely and Ethically

Tenable

But how can you ensure you use it securely, responsibly, ethically and in compliance with regulations? Check out best practices, guidelines and tips in this special edition of the Tenable Cybersecurity Snapshot! How can the security team contribute to these efforts? We look at best practices for secure use of AI.