article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO

Back in 2001, as I was just entering the venture industry, I remember the typical VC reaction to a start-up pitch was, “Can’t Microsoft replicate your product with 20 people and a few months of effort, given the resources they have?” Artificial intelligence (AI) in 2023 feels a bit like déjà vu to me.

Security 341
article thumbnail

What Executives Should Know About Shift-Left Security

CIO

Shift-left security” is the concept that security measures, focus areas, and implications should occur further to the left—or earlier—in the lifecycle than the typical phases that used to be entry points for security testing and protections. How did the term shift-left security originate?

Security 130
article thumbnail

Marc Benioff rails against Microsoft’s copilot

CIO

In 2001, Microsoft deactivated Clippy by default, and a few years later the unloved Office assistant disappeared from the program altogether. Let’s be real—Copilot’s a flop because Microsoft lacks the data, metadata, and enterprise security models to create real corporate intelligence.” However, Clippy was not well received.

article thumbnail

Improving Security by influencing Human Behavior

Xebia

We all know that the hardening of a system or implementing 2FA does not magically improves the security of an organisation. Also for the successful improvement of security in your organisation, a holistic approach is needed. Implementing and improving security demands your approach to cover both people, process and technology.

Agile 130
article thumbnail

Primer: The next act for security theater

The Parallax

The day after DefCon concluded this year, a prominent cybersecurity researcher and hacker known as the brain behind hacks featured on hit TV show Mr. Robot offered his resignation as the head of its security operations. Why are Androids less secure than iPhones? Security theater. Why current funding to secure U.S.

Hotels 189
article thumbnail

TechCrunch+ roundup: 11 PLG tactics, addressing copycat stigma, ‘unicorn glut’ theory

TechCrunch

“We’ve seen that all before … what’s new-ish (at least since 2001) is the massive overhang of growth investments that will take startups years to grow into,” he wrote. To better manage cybersecurity risk, extend zero-trust principles to third parties. ” The ‘unicorn glut’ theory of startup misery. .”

Windows 219
article thumbnail

How to Discover, Analyze and Respond to Threats Faster with Generative AI

Tenable

For security, GenAI can revolutionize the field if applied correctly, especially when it comes to threat detection and response. It enhances efficiency and productivity by swiftly processing and delivering critical information when it matters most. Security has always been about mitigating risk. So how does it work?