article thumbnail

Survey: More Cybersecurity Pros Embedded in DevOps Teams

DevOps.com

A survey of 2,500 C-level executives published today by Palo Alto Networks found 81% of organizations have embedded cybersecurity professionals within their DevOps teams. Despite the presence of those cybersecurity professionals, however, the survey also suggested there is much work to do in terms of optimizing DevSecOps workflows.

Survey 144
article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

And a global survey shows cyber pros weighing pros and cons of AI. 1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? Plus, CERT’s director says AI is the top skill for CISOs to have in 2024.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

To better manage cybersecurity risk, extend zero-trust principles to third parties

TechCrunch

Saket Modi is the co-founder and CEO of Safe Security, a cybersecurity and digital business risk quantification platform company. Today’s cybersecurity landscape requires an agile and data-driven risk management strategy to deal with the ever-expanding third-party attack surface. Saket Modi. Contributor. Share on Twitter.

Survey 279
article thumbnail

How security fears are driving network modernization

CIO

Research findings show that 93% of organization see the convergence of security and networking as a key focus of how future network characteristics will be changing. The good news is that decision-makers are universally aware of the security risks that proliferate in the absence of these solutions.

Network 321
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Cybersecurity firm Fortanix secures capital to provide confidential computing services

TechCrunch

Companies (and VCs ) spend billions of dollars on cybersecurity, but primarily focus on protecting infrastructure or endpoints. According to one 2021 survey, 61% of security leaders in the enterprise believed their cybersecurity teams to be understaffed. Some investors agree.

Hardware 169
article thumbnail

How Zero Trust can help align the CIO and CISO

CIO

The role of the CIO (Chief Information Officer) and CISO (Chief Information Security Officer) have become increasingly important in recent years as organizations place more emphasis on digital transformation and information security. government further highlights the importance of the zero trust security framework.