This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Recognizing this, INE Security is launching an initiative to guide organizations in investing in technical training before the year end. This approach not only ensures wise expenditure of remaining budgets but also significantly strengthens organizational security postures.
Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief informationsecurity officer at a SaaS company and a public financial institution. So why is compliance alone not enough?
For this reason, the AI Act is a very nuanced regulation, and an initiative like the AI Pact should help companies clarify its practical application because it brings forward compliance on some key provisions. Inform and educate and simplify are the key words, and thats what the AI Pact is for.
Other key uses include fraud detection, cybersecurity, and image/speech recognition. Most AI workloads are deployed in private cloud or on-premises environments, driven by data locality and compliance needs. This allows organizations to maximize resources and accelerate time to market. Cost, by comparison, ranks a distant 10th.
Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association
PCI compliance can feel challenging and sometimes the result feels like you are optimizing more for security and compliance than you are for business outcomes. The key is to take the right strategy to PCI compliance that gets you both. In this webinar you will learn: The right approach to a Zero Data security platform.
How does a business stand out in a competitive market with AI? For others, it may simply be a matter of integrating AI into internal operations to improve decision-making and bolster security with stronger fraud detection. Above all, robust governance is essential. Data breaches are not the only concern.
But when it comes to cybersecurity, AI has become a double-edged sword. While poised to fortify the security posture of organizations, it has also changed the nature of cyberattacks. While LLMs are trained on large amounts of information, they have expanded the attack surface for businesses.
It has become a strategic cornerstone for shaping innovation, efficiency and compliance. As enterprises scale their digital transformation journeys, they face the dual challenge of managing vast, complex datasets while maintaining agility and security. In 2025, data management is no longer a backend operation.
It has been sluggish on the M&A front in most sectors all year — and cybersecurity is no different. However, on Thursday New York-based data security startup Cyera bought data loss prevention firm Trail Security for $162 million. In April, Cyera raised a $300 million Series C led by Coatue at a $1.4 billion valuation.
For instance, AT&T launched a comprehensive reskilling initiative called “Future Ready” to train employees in emerging technologies such as cloud computing, cybersecurity, and data analytics. Organizations fear that new technologies may introduce vulnerabilities and complicate regulatory compliance.
As one of the most sought-after skills on the market right now, organizations everywhere are eager to embrace AI as a business tool. Its a wide-ranging skillset and each companys needs will vary depending on their business goals, but its a lucrative skill in the current hiring market.
Become reinvention-ready CIOs must invest in becoming reinvention-ready, allowing their enterprise to adopt and adapt to rapid technological and market changes, says Andy Tay, global lead of Accenture Cloud First. The pace of change in the global market and technology landscape demands organizations that can adapt quickly.
In this special edition, we’ve selected the most-read Cybersecurity Snapshot items about AI security this year. ICYMI the first time around, check out this roundup of data points, tips and trends about secure AI deployment; shadow AI; AI threat detection; AI risks; AI governance; AI cybersecurity uses — and more.
Its a bold move that could reshape how governments and businesses think about regulation, compliance, and the future of legal systems. Paving the way for smarter compliance The UAEs new AI system marks a major shift for businesses facing complex regulations. With the global AI legal tech market set to grow from $1.2
The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy. Meta originally went to market with a number of smaller models, says Sarer.
If there is a single theme circulating among Chief InformationSecurity Officers (CISOs) right now, it is the question of how to get stakeholders on board with more robust cybersecurity training protocols. Framing cybersecurity training as an essential investment rather than an optional expense is critical.”
Core principles of sovereign AI Strategic autonomy and security Countries, whether individually or collectively, want to develop AI systems that are not controlled by foreign entities, especially for critical infrastructure, national security, and economic stability.
W elcome to the TechCrunch Exchange, a weekly startups-and-markets newsletter. Just because you’re a startup doesn’t mean you can be careless with the data you’re handling, but enterprise-grade compliance and privacy used to be prohibitively expensive for small teams. Want it in your inbox every Saturday? Sign up here.
With increasing data privacy and security regulations, geopolitical factors, and customer demands for transparency, customers are seeking to maintain control over their data and ensure compliance with national or regional laws. As organizations expand globally, securing data at rest and in transit becomes even more complex.
CIOs must tie resilience investments to tangible outcomes like data protection, regulatory compliance, and AI readiness. However, CIOs must still demonstrate measurable outcomes and communicate these imperatives to senior leadership to secure investment. To respond, CIOs are doubling down on organizational resilience.
Cybersecurity and systemic risk are two sides of the same coin. Although it was not a security event, the symptoms and responses all fall into the various categories of the cybersecurity program for any company. Systemic risk and overall cybersecurity posture require board involvement and oversight.
Navigator: As technology landscapes and market dynamics change, enterprise architects help businesses navigate through complexity and uncertainty, ensuring that the organization remains on course despite evolving challenges. Data protection and privacy: Ensuring compliance with data regulations like GDPR and CCPA.
In CIOs 2024 Security Priorities study, 40% of tech leaders said one of their key priorities is strengthening the protection of confidential data. Protecting data from bad actors In an era where cyber threats are increasingly sophisticated, organizations must adopt a proactive security strategy to safeguard sensitive data.
In the first installment of our Stronger Cloud Security in Five blog series, we outline five best practices for boosting your cloud configuration management. In addition, having misconfigured cloud resources puts your organization on the wrong side of regulatory compliance, and thus open to costly penalties, fines and litigation.
Migration to the cloud, data valorization, and development of e-commerce are areas where rubber sole manufacturer Vibram has transformed its business as it opens up to new markets. We’re in publishing, but it’s the accompanying services that differentiate us on the market; the technology component is what gives value to our business.”
Because the best go-to-market (GTM) strategies for startups are like hamburgers: The bottom bun: Bottom-up GTM. The bottom bun — users not leads: In a top-down sales model, marketing creates leads that are then converted into sales by enterprise reps. The hamburger go-to-market strategy. The answer is the hamburger model.
Thats an eternity in tech terms ; by the time a deal is signed, market conditions may have changed, new competitors emerged, or the solution itself evolved. AI in Action: AI-powered contract analysis streamlines compliance checks, flags potential risks, and helps you optimize spending by identifying cost-saving opportunities.
This is particularly important for our customers functioning in highly regulated industries who have to keep up with continually changing security, privacy, and compliance requirements. This means approaching security as an integral and continuous part of the cycle. However, sometimes it is not enough.
Focused on digitization and innovation and closely aligned with lines of business, some 40% of IT leaders surveyed in CIO.com’s State of the CIO Study 2024 characterize themselves as transformational, while a quarter (23%) consider themselves functional: still optimizing, modernizing, and securing existing technology infrastructure.
China follows the EU, with additional focus on national security In March 2024 the Peoples Republic of China (PRC) published a draft Artificial Intelligence Law, and a translated version became available in early May. Lastly, China’s AI regulations are focused on ensuring that AI systems do not pose any perceived threat to national security.
Generative AI has taken the world seemingly by storm, impacting everything from software development, to marketing, to conversations with my kids at the dinner table. At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity.
The challenges don’t end once those requirements are met, as the project teams need to secure executive buy-in, which may be hindered by resistance to new technologies. A cloud-first approach ensures better data security, compliance with regulations, and scalability for AI-driven innovation,” says Domingues.
However, while businesses across the globe leverage the vast benefits of these applications, they face an equally rapid rise in the complexity of securing their assets, delivering unprecedented challenges in detecting and tackling threats to their cybersecurity posture. According to Forrester, enterprises spend a mean of $2.4
Successful CIOs work hand-in-hand with their C-suite peers to ensure that IT initiatives reflect the company’s ambitions—enhancing operational efficiency, driving innovation, or expanding market presence. Too often, companies adopt innovative technologies based on market hype without fully understanding how they contribute to their business.
Following that, the completed code of practice will be presented to the European Commission for approval, with compliance assessments beginning in August 2025. Srinivasamurthy pointed out that key factors holding back enterprises from fully embracing AI include concerns about transparency and data security.
Security weaknesses arise Security and risk vulnerabilities are important signs that modernization is immediately necessary. He notes that recent surveys by Gartner and Forrester show that over 50% of organizations cite security and efficiency as their main reasons for modernizing their legacy systems and data applications.
Today, cloud providers may offer better cybersecurity protections than many companies can provide on-premises. The security professional shortage Some 3.5 million cybersecurity jobs are unfilled globally, with 750,000 of them in the U.S., according to researchers at Cybersecurity Ventures.
In 2020, 11:11 CEO Brett Diamond noticed a gap in the market. Virtually every company relied on cloud, connectivity, and security solutions, but no technology organization provided all three. Justin Giardina, CTO at 11:11 Systems, notes that the company’s dedicated compliance team is also a differentiator.
There is a pending concern about how to manage AI agents in the cloud, says Dave McCarthy, research vice president at IDC, noting that the expanding availability of AI agents from startups and established vendors will give CIOs asset management, security, and versioning challenges.
GenAI also allows for new revenue streams by bringing products to market faster while delivering better customer experiences and automating processes. New security and risk solutions will be necessary as AI agents significantly increase the already invisible attack surface at enterprises.
Poor-quality data is as detrimental as a pipeline outage, and perhaps more, as it can lead to bad decisions and provide harmful information to customers. Cybersecurity underwent a similar evolution over the past 20 years. Now, mature organizations implement cybersecurity broadly using DevSecOps practices.
Check out best practices for shoring up data security and reducing cyber risk. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. 1 - CSA: How to boost data security and reduce cyber risk Risk assessment gaps. Plus, get tips on how to improve job satisfaction among tech staff.
Some of the best use cases Ive seen have been in marketing, and thats just one area. According to experts and other survey findings, in addition to sales and marketing, other top use cases include productivity, software development, and customer service. With these paid versions, our data remains secure within our own tenant, he says.
Over the past year, CISOs have wrestled with integrating AI into security processes, balancing the promised efficiencies with the need for stringent testing and adherence to security protocols. These copilots brought automation into enterprise security processes and strategies, transforming how organizations respond to cyber risks.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content