article thumbnail

Reporting cybersecurity posture and systemic risk to the board

CIO

Cybersecurity and systemic risk are two sides of the same coin. Although it was not a security event, the symptoms and responses all fall into the various categories of the cybersecurity program for any company. Systemic risk and overall cybersecurity posture require board involvement and oversight.

Security 199
article thumbnail

Cybersecurity GenAI features: Are they worth the money?

CIO

In many cases, it’s cybersecurity, which ranks at the top of the list of factors driving increased IT spending in 2024. Which cybersecurity capabilities does GenAI unlock? One way to gain perspective on those questions is assessing the extent to which AI has noticeably impacted cybersecurity tools. Where is all that money going?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How AI continues to reshape the cybersecurity arsenal

CIO

This necessitates continuous adaptation and innovation across various verticals, from data management and cybersecurity to software development and user experience design. Let’s talk about strengthening the four major pillars from an attacker’s perspective, as they form the core of any organization’s security.

Security 194
article thumbnail

Saildrone takes the wraps off its Voyager autonomous research vessel

TechCrunch

Naturally there are security applications as well: “illegal, unreported, and unregulated fishing” is a huge problem, especially given the fragile state of marine ecosystems right now. The data provided by autonomous platforms like Saildrone’s is useful for research purposes.

Research 269
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Apple releases security updates for iOS, iPadOS and macOS, fixing two actively exploited zero-days

TechCrunch

Apple has released security updates for iPhones, iPads and Macs to patch against two vulnerabilities, which the company says are being actively exploited to hack people. following a vulnerability disclosure by security researchers at Google’s Threat Analysis Group, which investigates […] © 2023 TechCrunch.

Analysis 331
article thumbnail

Runa Sandvik’s new startup Granitt secures at-risk people from hackers and nation states

TechCrunch

Sandvik is also a renowned hacker and security researcher and, as of recently, a founder. Sandvik told me about her work and her new bootstrapped startup, how leaders should prioritize their cybersecurity efforts, and, what piece of security advice she would give that every person should know. Image: (supplied).

Spyware 308
article thumbnail

Iterate Your Way to a Top Analytics Product Experience

Speaker: Richard Cheng, Associate Product Manager, Mark43

To fix traditionally paper-heavy and error-prone processes, they needed a secure and easy-to-use product experience that simplified and unified crime data collection and management.

article thumbnail

Embedded Analytics Insights for 2024

To better understand the factors behind the decision to build or buy analytics, insightsoftware partnered with Hanover Research to survey IT, software development, and analytics professionals on why they make the embedded analytics choices they do.

article thumbnail

Achieving Elite and High Performance DevOps Using DORA Metrics

Speaker: Nico Krüger, Senior Director of Solutions Engineering at Rollbar

DevOps Research and Assessment (DORA) has identified four key metrics to help organizations understand where their DevOps stands and how it can reach an elite level of performance. Build in security from the start. How is your organization’s DevOps doing? Do you have strategies to both identify problems and improve performance?

article thumbnail

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

He’ll explain how stitching together pre-existing solutions is often the best way to bring a stable, secure product to market most quickly. How do you help your engineers get on board with buying instead of building?