This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Ross Haleliuk Contributor Share on Twitter Ross Haleliuk is an investor and head of product at LimaCharlie.io. Anyone who has read productmanagement books, attended workshops or even simply gone through an interview, knows that what is not measured cannot be managed.
Ross Haleliuk Contributor Share on Twitter Ross Haleliuk is an investor and head of product at LimaCharlie.io. To start, it is very crowded, with hundreds and thousands of undifferentiated solutions promising to solve all security problems and more often than not, falling short of their promises.
Productmanager might be one of the most grey roles within a startup. Of these positions, productmanagement might be one of the most elusive — and key — roles to fill. Productmanagers need to realize that there is a lot of janitorial work that gets done in productmanagement,” he said.
Product-led growth is one of the most commonly discussed topics in the startup world as the market cap of public companies utilizing the growth tactic skyrocketed in recent years. It’s no different in the cybersecurity space. Of the 824 products reviewed, 151 can be described as product led. Image Credits: Ross Haleiuk.
Hear from ProductManagers across a variety of industries on what they see as most important for ensuring mobile reliability, and gain a better understanding of what it takes to build scalable and secure mobile apps.
Ross Haleliuk is a venture capitalist and head of product at LimaCharlie.io. H1 2022 cybersecurityproduct-led growth market map. Product-led growth (PLG) is more about the company’s mindset than it is about the product. It’s not uncommon to see cybersecurity startups trying to do two things at once.
Artificial intelligence (AI) is helping security teams modernize how they detect, investigate, and respond to threats not by replacing analysts or reinventing cybersecurity, but by making existing workflows faster, smarter, and more efficient. Flexible and transparent by design Security teams need to understand how AI makes decisions.
This summer, the Federal Communications Commission (FCC) officially launched its ninth Communications Security, Reliability, and Interoperability Council (CSRIC) – a stakeholder-driven body advising the FCC on ways to ensure the security, reliability and interoperability of communications systems.
Cybersecurity continues to be a major area for investment among businesses — and VCs. While a decline from the previous year, venture capital funding in the cybersecurity sector totaled $18.5 PitchBook data shows a decline in cybersecurity valuations at the seed and Series A stages in particular.
Speaker: Richard Cheng, Associate Product Manager, Mark43
Mark43 is on a mission to bring public safety data management into the 21st century. To fix traditionally paper-heavy and error-prone processes, they needed a secure and easy-to-use product experience that simplified and unified crime data collection and management.
Unsurprisingly, this is leading to staff frustration and burnout, dissatisfied end users and persistent security vulnerabilities. The reasons include more software deployments, network reliability problems, security incidents/outages, and a rise in remote working. For many, the main channel of interaction with users is the telephone.
Checkmarx this week extended the scope of its ability to protect software supply chains with tools that access how secure a repository is and find where application secrets have been shared in a way that is not secure.
At the recent Six Five Summit , I had the pleasure of talking with Pat Moorhead about the impact of Generative AI on enterprise cybersecurity. Protecting the Enterprise So, what can security professionals do to properly safeguard the use of Generative AI tools by their employees?
Eureka , a Tel Aviv-based startup that provides enterprises with tools to managesecurity risks across their various data stores, today announced that it has raised an $8 million seed round led by YL Ventures. “Security leaders are especially excited about Eureka’s policy translation engine,” Hayun explained.
Speaker: Lisa Mo Wagner, Product Management Coach, Writer, Speaker and WomenTech Ambassador
Timeline roadmaps provide us with a false sense of certainty and security. Often, product teams fall into the trap of creating a roadmap that doesn’t support timely customer feedback. Companies frequently make this mistake by creating a product roadmap 1-3 years in advance. How to Incorporate Customer Feedback into Your Roadmap.
” 3 key metrics for cybersecurityproductmanagers TechCrunch+ roundup: Minimizing M&A mayhem, cybersecurity PM checklist, open source AI by Walter Thompson originally published on TechCrunch . — Extraordinary Engineer in Escondido Ask Sophie: Can I apply for an EB-1A without first getting an O-1A?
IT organizations are increasingly shifting from project-based organizational structures to product-based methodologies , which involve cross-functional teams. Productmanagers aren’t a new job category by any means, but this shift means that they’re newly prominent and important to many companies’ strategies.
The Internet of Things has a security problem. The past decade has seen wave after wave of new internet-connected devices, from sensors through to webcams and smart home tech, often manufactured in bulk but with little — if any — consideration to security. Security veteran Window Snyder thinks there is a better way.
As project-based business practices give way to product-focused cross-functional teams, the productmanager role is taking on prominence, increasingly attracting interest from job candidates who might otherwise go into IT. Do productmanagers make good money? As you grow in your career, so will your salary.
Job titles like data engineer, machine learning engineer, and AI productmanager have supplanted traditional software developers near the top of the heap as companies rush to adopt AI and cybersecurity professionals remain in high demand. An example of the new reality comes from Salesforce.
On the contrary, poor planning and design decisions could result in a scenario where modernization spawns more cost, security and/or IT management problems than it solves. Protect data security and privacy Along similar lines, ensuring data security and privacy shouldnt be something you do after modernization is complete.
So, what are its implications for the enterprise and cybersecurity? The cybersecurity challenges Generative AI, including ChatGPT, is primarily delivered through a software as a service (SaaS) model by third parties. As it stands today, most Generative AI tools do not have concrete data security policies for user-provided data.
Hence, it is one of the vast industries of India that can be suitable to build a secure career path. ProductManager. A productmanager is a crucial professional in the IT sector because they design the entire roadmap of the software product. Cybersecurity Specialist. Conclusion.
Barely half of the Ivanti respondents say IT automates cybersecurity configurations, monitors application performance, or remotely checks for operating system updates. Lack of DEX data undermines improvement goals This lack of data creates a major blind spot , says Daren Goeson, SVP of ProductManagement at Ivanti.
Regardless of the driver of transformation, your companys culture, leadership, and operating practices must continuously improve to meet the demands of a globally competitive, faster-paced, and technology-enabled world with increasing security and other operational risks.
Mehul Revankar is a cybersecurity professional with over 15 years of experience in vulnerability management, policy compliance and security operations. He leads the productmanagement and engineering functions for VMDR (Vulnerability Management, Detection and Response) at Qualys. Mehul Revankar. Contributor.
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, productmanagement, consulting, engineering and more.
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, productmanagement, consulting, engineering and more. Read our interview with Faraz Ahsan.
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “ AI’s Impact in Cybersecurity ” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, productmanagement, consulting, engineering and more.
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, productmanagement, consulting, engineering and more.
The funding amount isn’t going to impress anyone as the company managed to secure $55 million. This could be considered as an extension of the $400 million Series D round as Wefox managed to maintain the same valuation of $4.5 As a reminder, Wefox sells insurance products through in-house and external insurance brokers.
Transformational CIOs recognize the importance of IT culture in delivering innovation, accelerating business impacts, and reducing operational and security risks. Facilitate developing self-organizing standards where team leaders, enterprise architects , and productmanagers promote best practices and establish design principles.
Costanoa is also doubling down on cybersecurity — as the threat instance has increased with AI as well as the potential to improve security operations — and national security. Sands noted that AI does not replace the need for “excellent productmanagement” and that “data is as important as the algorithm.”
Broadcom and Google Clouds continued commitment to solving our customers most pressing challenges stems from our joint goal to enable every organizations ability to digitally transform through data-powered innovation with the highly secure and cyber-resilient infrastructure, platform, industry solutions and expertise.
Before Angi, Levin worked at Thomson Reuters as a productmanager, while Greene was a senior productmanager on Amazon’s digital music team. Regal secures capital to grow its platform for branded calls and texts by Kyle Wiggers originally published on TechCrunch.
In August 2024, we asked our customers to tell us about security: their role in security, their certifications, their concerns, and what their companies are doing to address those concerns. We had 1,322 complete responses, of which 419 (32%—roughly one-third) are members of a security team. are managers, 7.2%
{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a weekly blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, productmanagement, consulting, engineering and more.
Some cybersecurity experts advise against using SMS texts as a second layer of security, since a SIM swapping hack (someone impersonating you to your phone carrier to take over your SIM card) could render you powerless against fraudulent log-in attempts. Cybersecurity 101: How to protect your online security and digital privacy.
For technologists with the right skills and expertise, the demand for talent remains and businesses continue to invest in technical skills such as data analytics, security, and cloud. The demand for specialized skills has boosted salaries in cybersecurity, data, engineering, development, and program management. as of January.
We believe that by enabling consumers to own their data, securely hold it, and share it for access or updates, that’s the right way to make good on a lot of the promises you hear about in open banking.”. In a way, by putting users in charge of their authentic data, Portabl is turning them into secure APIs of themselves,” he told TechCrunch.
Two-factor authentication adds an extra layer of security to account log-ins. That form of 2FA, while certainly more secure than single-factor authentication, is susceptible to SIM card jacking. Poor security, not just password reuse, to blame for Disney+ breach. Primer: How to lock your online accounts with a security key.
IT managers are often responsible for not just overseeing an organization’s IT infrastructure but its IT teams as well. To succeed, you need to understand the fundamentals of security, data storage, hardware, software, networking, and IT management frameworks — and how they all work together to deliver business value.
Moreover, undertaking digital transformation and technology modernization programs without an architect can lead to delays, technical debt , higher costs, and security vulnerabilities. I recommend three primary roles: a productmanager owning the vision, a delivery leader overseeing agile teams and implementation, and a program sponsor.
Additionally, nuclear power companies and energy infrastructure firms are hiring to optimize and secure energy systems, while smart city developers need IoT and AI specialists to build sustainable and connected urban environments, Breckenridge explains.
We organize all of the trending information in your field so you don't have to. Join 49,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content