article thumbnail

Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit

CIO

Here’s the secret to creating a board presentation on cybersecurity, according to Victor Shadare, head of cybersecurity at the international publishing giant Condé Nast : “The board doesn’t have time to look at detail as such. They want something that’s going to punch them in the face,” he said.

Strategy 287
article thumbnail

Oligo raises $28M to secure open-source libraries at runtime

TechCrunch

Oligo Security , a Tel Aviv-based startup that focuses on runtime application security and observability to detect and prevent open-source vulnerabilities, is coming out of stealth today and announcing that it has raised a total of $28 million in seed and Series A funding. This, ideally, cuts down on unnecessary alerts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TechCrunch+ roundup: Minimizing M&A mayhem, cybersecurity PM checklist, open source AI

TechCrunch

Given the tremendous barrier to entry, is it worth considering whether open source foundation models could level the playing field and also address concerns about privacy and bias?

article thumbnail

The Significance of Open Source Software in the Digital-First Future Enterprise

CIO

To become a software-powered organisation, companies must first identify and address the concerns of its developers in areas such as developer experience, developer velocity and software security. With the rise of microservices and cloud-native applications, new security challenges are arising for enterprise IT departments.

article thumbnail

Cybersecurity Snapshot: Get the Latest on Deepfake Threats, Open Source Risks, AI System Security and Ransomware Gangs

Tenable

Tasked with securing your org’s new AI systems? Plus, open source security experts huddled at a conference this week – find out what they talked about. That’s the topic of the paper “ Securing AI: Similar or Different? Check out a new Google paper with tips and best practices. And much more!

article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins. With every such change comes opportunity–for bad actors looking to game the system.

Trends 275
article thumbnail

H1 2022 cybersecurity product-led growth market map

TechCrunch

It’s no different in the cybersecurity space. To find out, I analyzed more than 800 products from over 600 vendors using information from open sources, including Google, Gartner, CB Insights and startup/vendor lists from different sources. What’s pushing cybersecurity companies to adopt product-led growth?

Security 242