Remove Compliance Remove Security Remove Weak Development Team
article thumbnail

For startups, trustworthy security means going above and beyond compliance standards

TechCrunch

Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief information security officer at a SaaS company and a public financial institution. So why is compliance alone not enough?

Security 345
article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Overcoming the 6 barriers to IT modernization

CIO

Solution: Invest in continuous learning and development programs to upskill the existing workforce. For instance, AT&T launched a comprehensive reskilling initiative called “Future Ready” to train employees in emerging technologies such as cloud computing, cybersecurity, and data analytics. A: Expensive, bad processes.

article thumbnail

The Importance of Security and Compliance in Enterprise Applications

OTS Solutions

However, as more organizations rely on these applications, the need for enterprise application security and compliance measures is becoming increasingly important. Breaches in security or compliance can result in legal liabilities, reputation damage, and financial losses.

article thumbnail

5 ways to attract top cybersecurity talent in a tight labor market

TechCrunch

George Gerchow is the chief security officer at Sumo Logic. He earned a master’s degree from Villanova, but it was in human resources development. He spent 16 years in the Marine Corps in various military and civilian roles, but none directly involved cybersecurity. Share on Twitter. Why am I talking to this guy?”

article thumbnail

The future of data: A 5-pillar approach to modern data management

CIO

This approach is repeatable, minimizes dependence on manual controls, harnesses technology and AI for data management and integrates seamlessly into the digital product development process. Poor-quality data is as detrimental as a pipeline outage, and perhaps more, as it can lead to bad decisions and provide harmful information to customers.

Data 167
article thumbnail

How Tech Leaders Are Using AI to Solve 10 Procurement Challenges

CIO

AI in Action: AI-powered contract analysis streamlines compliance checks, flags potential risks, and helps you optimize spending by identifying cost-saving opportunities. CIOs Need to Upskill Their Teams in AI and Cybersecurity The Challenge: 62% of IT leaders told IDC that a lack of skills had resulted in missed revenue growth objectives.