This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.
Oren Yunger is an investor at GGV Capital , where he leads the cybersecurity vertical and drives investments in enterprise IT, data infrastructure, and developer tools. He was previously chief informationsecurity officer at a SaaS company and a public financial institution. More posts by this contributor.
Simultaneously, the monolithic IT organization was deconstructed into subgroups providing PC, cloud, infrastructure, security, and data services to the larger enterprise with associated solution leaders closely aligned to core business functions.
Overall, successful CIOs in 2025 will need to balance technical expertise with business acumen, leadership, and a focus on data, AI, cybersecurity, and M&A integration. AI adoption, IT outsourcing, and cybersecurity risks are fundamentally reshaping expectations. Cybersecurity is also a huge focus for many organizations.
Plus, OWASP is offering guidance about deepfakes and AI security. Those are three security measures cyber teams should proactively take in response to an ongoing and “large scale” email spear-phishing campaign targeting victims with malicious RDP files , according to the U.S. Block transmission of RDP files via email.
According to Leon Roberge, CIO for Toshiba America Business Solutions and Toshiba Global Commerce Solutions, technology leaders should become more visible to the business and lead by example to their teams. Fernandes says his team has made it a point to only invest where the business also invests to avoid a black hole of IT spending.
Mainframe systems process a vast amount of vital transactions daily—that includes everything from the swipe of a credit card at the grocery store to purchasing an airline ticket online or accessing sensitive healthcareinformation. Once hackers find their way into the mainframe, it’s easy for it to go unnoticed.
government-sponsored Health Care Industry Cybersecurity Task Force delivered more than 100 recommendations to the Department of Homeland Security to make medical technology more resistant to hackers. READ MORE FROM ‘NO PANACEA FOR MEDICAL CYBERSECURITY’. Triaging modern medicine’s cybersecurity issues.
Telehealth company Lucid Lane raised $16 million in Series A funding to continue developing its platform that enables real-time intervention for people with medication dependence and substance-use disorders. Lucid Lane has developed a service to get patients off of pain meds and avoid dependence.
Generative AI is already having an impact on multiple areas of IT, most notably in software development. Still, gen AI for software development is in the nascent stages, so technology leaders and software teams can expect to encounter bumps in the road.
Our survey respondents said the city was strong across a broad range of tech industries, particularly those with practical applications: cybersecurity, energy and sustainability, fintech, health care and medtech, edtech and silver tech among others. Lukas Inokaitis , business development, NFQ Technologies. What is it weak in?
In August 2024, we asked our customers to tell us about security: their role in security, their certifications, their concerns, and what their companies are doing to address those concerns. We had 1,322 complete responses, of which 419 (32%—roughly one-third) are members of a securityteam. are managers, 7.2%
How enterprises gather, store, cleanse, access, and secure their data can be a major factor in their ability to meet corporate goals. Organizations often get services and applications up and running without having put stewardship in place,” says Marc Johnson, CISO and senior advisor at Impact Advisors, a healthcare management consulting firm.
Since ChatGPT, Copilot, Gemini, and other LLMs launched, CISOs have had to introduce (or update) measures regarding employee AI usage and data security and privacy, while enhancing policies and processes for their organizations. Currently, the team is working to quickly review security and privacy issues, particularly as regulations evolve.
News broke this morning that Bain Capital Private Equity and Crosspoint Capital Partners are purchasing Seattle-based network security startup ExtraHop. Network security startup ExtraHop skips and jumps to $900M exit. Securities and Exchange Commission last week announcing its intent to become a public company. yourprotagonist.
Anyone could hire a developer to build your technology, but what is it about your past personal or professional experiences that makes you the best person to build this product or company? you need to be vocal, and not just in closed-door meetings with your team. Lastly, why you what makes you uniquely qualified to solve this problem?
Artificial intelligence (AI) plays a crucial role in both defending against and perpetrating cyberattacks, influencing the effectiveness of security measures and the evolving nature of threats in the digital landscape. As cybersecurity continuously evolves, so does the technology that powers it. staff researcher and Doren Rosen, Sr.
This isn’t just a few individual bad actors; it’s a sophisticated, industrial-scale, state-sponsored threat that’s been simmering for the last two years and has now reached full boil. June 2024: The Wall Street Journal interviews CEOs about bad actors using deepfakes to get hired into cybersecurity positions.
Plus, learn the latest details about the Change Healthcare breach, including the massive scope of the data exfiltration. 1 - New version of MITRE ATT&CK adds guidance on generative AI, cloud threats Information about malicious use of generative AI tools. Advice about securing cloud environments. And much more!
Cybersecurity and Infrastructure Agency, combined with significant bills coming out of the House and Senate, are putting critical infrastructure operators on a path towards achieving cross-sector visibility and strong operational technology security. Recent efforts by the U.S. In the U.S., In the U.S.,
After all, in today’s rapid-paced business world, a creative, productive IT team is vital for staying ahead of the competition, increasing revenue, and becoming a market leader. To establish a high-performing IT culture, IT leaders must be able to push their teams to the limit without crippling morale.
Operating rooms are a significant source of revenue for healthcare organizations — and a main contributor to costs. As such, any cost savings in operating rooms can have broad financial impact on a healthcare facility’s bottom line. As a result, the healthcare organization must ship all possible standard sizes in for each surgery.”
We recently caught up with Guillermo Guerra, Prudential Group Chief InformationSecurity Officer, to discuss security and identity management. Guillermo began his career at Prudential as chief informationsecurity officer at Jackson National Life Insurance Company, or Jackson, a Prudential subsidiary.
While organizations continue to discover the powerful applications of generative AI , adoption is often slowed down by team silos and bespoke workflows. As a result, building such a solution is often a significant undertaking for IT teams. Responsible AI components promote the safe and responsible development of AI across tenants.
Hallucinations occur when the data being used to train LLMs is of poor quality or incomplete. Chatbots are almost like a living organism in that they are continually iterating, and as they ingest new data,” says Steven Smith, chief security architect at Freshworks. Security guardrails. You get out what you put in.”
Thanks to hard work from the entire TechCrunch team, authoritative guest contributors and a very engaged reader base, we’ve tripled our membership in the last 12 months. The quartet selected four startups each from Chicago, Boston and Techstars Workplace Development. “Often these founders with Ph.D.s
The World Health Organization (WHO) has not only been busy dealing with healthcare challenges, it also saw a significant increase in cyb e r attacks. The rapidly growing volume and sophistication of attacks entail the need for greater preparedness, especially through regular security exercises.
Poor onboarding is the enemy of good hiring. The pair joined Y Combinator’s winter 2019 batch and got to work on their technology, developing tools so that companies could hire better frontline workers faster while also providing candidates with a better recruitment experience. This gives the company a total of $13.3
The development of an IT strategy offers an ideal opportunity for CIOs to expand their business acumen. Its a process that not only aligns IT with the organizations goals but also cultivates strategic thinking across the IT leadership team. We enable operations through our strategic plan and growth model, Martin explained.
PKI and cryptography have always been very low-level, in the weeds but foundational for security even though CIOs probably haven’t paid much attention to it,” says Christian Simko, VP of product marketing at low-code automation platform AppViewX. One you start to bring compliance in, the CIO starts to take a little bit more notice as well.”
Meanwhile, check out a Carnegie Mellon comp sci professor’s take on AI system security. Source: IBM’s “Cost of a Data Breach Report 2024,” July 2024) Meanwhile, AI has become both a blessing and a curse, helping securityteams and data thieves alike. million less in breach costs than securityteams that don’t use AI at all.
The complexity of today’s enterprise infrastructure environment has created demand for a great variety of dedicated point security solutions, triggering a disconcerting array of alarms and alerts that most organizations struggle to address with current access to talent and staff. involved in the risk management process.
IT complexity, seen in spiraling IT infrastructure costs, multi-cloud frameworks that require larger teams of software engineers, the proliferation of data capture and analytics, and overlapping cybersecurity applications, is the hallmark—and also the bane—of the modern enterprise. At long last, the tide may be turning.
No matter who reads what, the technology found its way to virtually every industry — from healthcare to travel to retail. All data goes through the middleman — in our case, Kafka — that manages messages and ensures their security. With these basic concepts in mind, we can proceed to the explanation of Kafka’s strengths and weaknesses.
Instead of executing per direction of business-developed requirements, Mehta and his CIO peers are now skilled at steering their organizations to strategic initiatives that hold the most promise. Case in point: Mehta, who now has the responsibility of developing National Life’s three-year enterprise strategy.
Developing generative AI implementation strategies will be imperative for technology leaders, prioritizing key areas such as business model building, internal operational improvements, risk mitigation, and overall organizational efficiency. This year, GenAI and Large Language Models, such as ChatGPT, are positioned as vectors of change.
But poor data quality, siloed data, entrenched processes, and cultural resistance often present roadblocks to using data to speed up decision making and innovation. Real-time data and automated processes present a powerful combination for improving cybersecurity and resiliency. Customers have too many options.
It was interesting joining this team and becoming the CIO at an organization that I knew well,” he says. We defined a clearly set service catalog against an idle framework, and were able to set portfolio leads around the capabilities we’ve developed,” he says. Second, there’s having a resilient enterprise that is risk-informed.
In today’s digital landscape, where cyber threats are on the rise, ensuring robust cybersecurity measures in custom software development projects is more important than ever. Why is Cybersecurity Important in Software Development? Maintaining Trust Cybersecurity is critical to maintaining user trust.
Prisma Cloud Achieves StateRAMP Authorized Status In its commitment to be the state and local government's cybersecurity partner of choice, Prisma Cloud by Palo Alto Networks has achieved StateRAMP Authorized status, providing unparalleled security for modernization efforts leveraging cloud infrastructure. What Is StateRAMP?
The perils of unsanctioned generative AI The added risks of shadow generative AI are specific and tangible and can threaten organizations’ integrity and security. Following are three recommendations for encouraging innovation while maintaining security, compliance, ethics, and governance standards.
Examples: Alleged discrimination in credit lines ; Poor experimental design in healthcare algorithms. Solid technology must be paired with culture and process changes, like increased demographic and professional diversity on the teams that build AI systems and better audit processes for those systems.
Artificial intelligence is already showing its potential to reshape nearly every aspect of cybersecurity – for good and bad. If anything represents the proverbial double-edged sword, it might be AI: It can act as a formidable tool in creating robust cybersecurity defenses or can dangerously compromise them if weaponized.
And get the latest on the Change Healthcare breach. Cybersecurity and Infrastructure Security Agency (CISA), the Ransomware Vulnerability Warning Pilot program probes internet-facing assets from participating organizations. Plus, a CISA program is helping critical infrastructure organizations prevent ransomware attacks.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content