This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The 2024 Security Priorities study shows that for 72% of IT and security decision makers, their roles have expanded to accommodate new challenges, with Risk management, Securing AI-enabled technology and emerging technologies being added to their plate.
Shifts in CTO Responsibilities Over Time The ChiefTechnologyOfficer (CTO) role has evolved dramatically over the past few decades, driven by rapid technological advancements and shifting business landscapes. They help propel organizations toward achieving their digital transformation objectives.
Job titles like data engineer, machine learning engineer, and AI product manager have supplanted traditional software developers near the top of the heap as companies rush to adopt AI and cybersecurity professionals remain in high demand. An example of the new reality comes from Salesforce.
Adopting emerging technology to deliver business value is a top priority for CIOs, according to a recent report from Deloitte. That means IT veterans are now expected to support their organization’s strategies to embrace artificial intelligence, advanced cybersecurity methods, and automation to get ahead and stay ahead in their careers.
It was an interesting case study of global cyber impact, says Charles Clancy, CTO at Mitre. Ditching them isnt the answer if theyre the best product on the market. What happened In CrowdStrikes own root cause analysis, the cybersecurity companys Falcon system deploys a sensor to user machines to monitor potential dangers.
In a time where trust and reliability are paramount, meeting these expectations through technology isnt just a differentiator its now a business imperative, Pappas says. Double down on cybersecurity In 2025, there will be an even greater need for CIOs to fully understand the current cybersecurity threat landscape.
Back then, Mastercard had around 3,500 employees and a $4 billion market cap. As more AI innovations come to market, financial institutions can leverage the technology for enhanced services, increased efficiency, and new ways to deliver and manage products. But it wasn’t the tech that made Mastercard what it is today.
Traditionally, cybersecurity has always focused on what can be hacked and not so much on who might be most at risk. Sunday Security , which is launching today and announcing a $4 million seed funding round, is trying to switch this up by offering cyber-risk protection for senior executives and other key personnel.
IT leaders must understand how the business plans to compete, grow, and create value in the market to align IT initiatives within the company’s broader objectives. With this information, IT can craft an IT strategy that gives the company an edge over its competitors. Learn more about IDC’s research for technology leaders.
By Leonard Kleinman, Field ChiefTechnologyOfficer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. Let’s look at some of these cybersecurity challenges and how automation can level the playing field.
Both types of gen AI have their benefits, says Ken Ringdahl, the companys CTO. The main commercial model, from OpenAI, was quicker and easier to deploy and more accurate right out of the box, but the open source alternatives offered security, flexibility, lower costs, and, with additional training, even better accuracy.
Many large enterprises now rely on hundreds of third-party SaaS applications to do business, but their security organizations can barely keep pace. Right now, the state of the art for SaaS enterprise security are cloud access security brokers (CASBs) that act as intermediaries between users and the actual service.
Because technology is continuously changing, IT consultants can provide clients with the latest information about new technologies as they become available, recommending implementation strategies based on their clients needs. As a result, for IT consultants, keeping the pulse of the technologymarket is essential.
” The company claims that it cut costs in travel, vendor spend, marketing spend and investments in new bets, but that it ultimately had to reduce headcount. As TechCrunch reported earlier today , Carta is suing its former CTO, Jerry Talton, who was fired “for cause” almost three weeks ago, on December 23, according to the company.
What is a CTO? The chieftechnologyofficer (CTO) is the senior executive who focuses on the technological requirements, opportunities, and challenges within an organization. What does a CTO do? What does a CTO do? Years ago, the CTO most often led the infrastructure function.
Cybersecurity continues to be a major area for investment among businesses — and VCs. While a decline from the previous year, venture capital funding in the cybersecurity sector totaled $18.5 PitchBook data shows a decline in cybersecurity valuations at the seed and Series A stages in particular.
Such a cryptographically relevant quantum computer (CRQC) could deliver a devastating impact to global cybersecurity protocols. To prepare for this worst-case scenario, Mastercard launched its Quantum Security and Communications project, which earned the company a 2023 US CIO 100 Award for IT innovation and leadership.
Beam, which currently operates e-scooters and e-bikes in 35 cities across Malaysia, Thailand, South Korea, Australia and New Zealand, aims to spread into markets like Japan, Indonesia, the Philippines, Vietnam and Turkey. . Advanced rider assistance systems: Tech spawned by the politics of micromobility.
Dun and Bradstreet has been using AI and ML for years, and that includes gen AI, says Michael Manos, the companys CTO. And a Red Hat survey of IT managers in several European countries and the UAE found that 71% reported a shortage of AI skills, making it the most significant skill gap today, ahead of cybersecurity, cloud, and Agile.
In general, they’re seeking ideas that can scale and founders who can execute, which is why every pitch deck needs to describe “what could be better and how that gap in the market can be turned into an opportunity,” writes Haje Jan Kamps. Cybersecurity teams, beware: The defender’s dilemma is a lie Image Credits: A.
Now, cybersecurity startup Nudge Security is emerging from stealth to help organizations tackle what they think is the biggest cybersecurity weakness: people. We also provide supply chain information,” added Blasco, Nudge’s co-founder and chieftechnologyofficer.
Networking and cybersecurity firm Versa today announced that it raised $120 million in a mix of equity and debt led by BlackRock, with participation from Silicon Valley Bank. Versa’s large round suggests that, despite the market downturn, VCs haven’t lost faith in cybersecurity vendors yet. billion in 2021).
Columbus, Ohio-based Finite State, a startup that provides supply chain security for connected devices and critical infrastructure, has raised $30 million in Series B funding. . The funding lands amid increased focus on the less-secure elements in an organizations’ supply chain, such as Internet of Things devices and embedded systems.
I’ve seen projects falter when IT leaders fail to recognize non-traditional stakeholders like marketing teams using unsanctioned tools,” says Leonard. “In In one case, this oversight led to a fragmented IT landscape and security vulnerabilities.” Otherwise, you’ll suggest solutions they’ll never adopt,” he says.
The cloud may be the direction that much of enterprise IT is moving today, but it still remains a major source of security issues, with some 98% of all enterprises in a recent survey reporting that they have contended with a cloud-related security breach in the last 18 months.
Security weaknesses arise Security and risk vulnerabilities are important signs that modernization is immediately necessary. He notes that recent surveys by Gartner and Forrester show that over 50% of organizations cite security and efficiency as their main reasons for modernizing their legacy systems and data applications.
However, CIOs must still demonstrate measurable outcomes and communicate these imperatives to senior leadership to secure investment. According to Salesforces Perez, even though AI brings much opportunity, it also introduces complexity for CIOs, including security, governance, and compliance considerations.
SAP CTO Juergen Mueller will step down from SAP’s executive board at the end of September. “I At the end of July, the company announced the departure of its long-serving heads of marketing and of sales , Julia White and Scott Russell. I want to address an incident at a past company event where my behavior was inappropriate.
The future is now Even with some issues to work out, and some resistance from developers to AI coding assistants, AI-native coding is the future, says Drew Dennison, CTO of code security startup Semgrep. Gen AI tools are advancing quickly, he says.
based cybersecurity startup, has secured a $12 million Series A investment to bring multi-factor authentication (MFA) to machine-to-machine API traffic. That’s what we’re doing in the API world,” Corsha co-founder and CTO Anusha Iyer told TechCrunch. government doesn’t stop there, as Corsha secured the U.S
Some of the best use cases Ive seen have been in marketing, and thats just one area. According to experts and other survey findings, in addition to sales and marketing, other top use cases include productivity, software development, and customer service. With these paid versions, our data remains secure within our own tenant, he says.
Protecting these ever-increasing volumes of data is a high priority, and while there are many different types of cybersecurity threats to enterprise data, ransomware dominates the field. Claus Torp Jensen , formerly CTO and Head of Architecture at CVS Health and Aetna, agreed that ransomware is a top concern. “At To watch 12.8
So Greenwald, Shoshan and Sarid, the former CTO of MuleSoft, founded Otterize , which aims to allow developers to securely connect different software services to each other and infrastructure by automatically configuring existing security controls. Otterize today raised $11.5 Time will tell. ” Otterize raises $11.5M
However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. Early cybersecurity threats were limited in their scope and damage, but current threats can ruin a business. Worldwide responses show that attackers are increasingly able to extract more sensitive data.”
Israel’s retrain.ai , which uses AI and machine learning to read job boards at scale and gain insight into where the job market is going, has closed a $9 million Series A led by Square Peg. With technology eating into the traditional labor market, retrain.ai Its competitors include Pymetrics, which has raised $56.6
Successful CIOs work hand-in-hand with their C-suite peers to ensure that IT initiatives reflect the company’s ambitions—enhancing operational efficiency, driving innovation, or expanding market presence. Too often, companies adopt innovative technologies based on market hype without fully understanding how they contribute to their business.
Hypernative , a crypto security-focused startup, has raised $9 million in seed funding as it emerges from stealth, co-founder and CEO Gal Sagie exclusively told TechCrunch. The company was started by Sagie and Dan Caspi, who’s also Hypernative’s CTO. The company was started by Sagie and Dan Caspi, who’s also Hypernative’s CTO.
In addition, the company today officially launched its Cilium platform (which was in stealth until now) to help enterprises connect, observe and secure their applications. The founding team of CEO Dan Wendlandt and CTO Thomas Graf has deep experience in working on the Linux kernel and building networking products.
Spera , a Palo Alto-based security startup that provides businesses with the tools to proactively protect themselves from identity-driven threats, today said it has raised a $10 million seed funding round led by YL Ventures, with participation from a number of prominent angel investors and serial entrepreneurs.
Samsung Securities and AFW Partners led the round. Keller, one of the most acclaimed engineers in the semiconductor industry, joined the company in 2021 as president and chieftechnologyofficer, and was named CEO in early 2023. Jeff Bezos ’ Bezos Expeditions , Fidelity Management & Research Co.
Security operations teams face a daunting task these days, fending off malicious hackers and their increasingly sophisticated approaches to cracking into networks. That also represents a gap in the market: building tools to help those security teams do their jobs. It’s time for security teams to embrace security data lakes.
According to Salt Labs, the research division of Salt Security (which sells API cybersecurity products, granted), API attacks from March 2021 to March 2022 increased nearly 681%. Bansal saw the writing on the wall four years ago, he said, when he cofounded San Francisco-based Traceable with CTO Sanjay Nagaraj.
The challenges don’t end once those requirements are met, as the project teams need to secure executive buy-in, which may be hindered by resistance to new technologies. A cloud-first approach ensures better data security, compliance with regulations, and scalability for AI-driven innovation,” says Domingues.
As more enterprises migrate apps and workloads into the cloud, so grows the need for more sophisticated tech to secure that activity. Collectively, it says it now secures apps covering 78 million users and 230 million exposed data records and more than 9 billion monthly events.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content