article thumbnail

Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates

Tenable

Plus, learn why GenAI and data security have become top drivers of cyber strategies. And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer valuable tips.

article thumbnail

6 common challenges facing cybersecurity teams and how to overcome them

TechCrunch

More posts by this contributor Time to trust: Questions cybersecurity customers ask and how to answer them 4 ways cybersecurity startups can boost adoption and shorten time to value Building products and companies in cybersecurity is not an easy task because in many ways, the industry behaves differently from others.

Security 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: What Looms on Cyberland’s Horizon? Here’s What Tenable Experts Predict for 2025

Tenable

Wondering what cybersecurity trends will have the most impact in 2025? Check out six predictions from Tenable experts about cyber issues that should be on your radar screen in the new year including AI security, data protection, cloud security and much more! After all, data is the fuel that powers businesses.

Cloud 73
article thumbnail

Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros

Tenable

Check out best practices for shoring up data security and reducing cyber risk. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. 1 - CSA: How to boost data security and reduce cyber risk Risk assessment gaps. Plus, get tips on how to improve job satisfaction among tech staff.

article thumbnail

Generative AI Deep Dive: Advancing from Proof of Concept to Production

Speaker: Maher Hanafi, VP of Engineering at Betterworks & Tony Karrer, CTO at Aggregage

💡 This new webinar featuring Maher Hanafi, VP of Engineering at Betterworks, will explore a practical framework to transform Generative AI prototypes into impactful products! There's no question that it is challenging to figure out where to focus and how to advance when it’s a new field that is evolving everyday.

article thumbnail

Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits

Tenable

And get the latest on cloud security, SMBs' MFA use and the CIS Benchmarks. Document the secure baseline configurations for all IT/OT systems. Secure internet-facing devices. Plus, a new guide says AI system audits must go beyond check-box compliance. Meanwhile, a report foresees stronger AI use by defenders and hackers in 2025.

System 75
article thumbnail

Navigating the SEC’s Cybersecurity Disclosure Rules: One Year On

Tenable

Securities and Exchange Commission (SEC)began enforcing new cybersecurity disclosure rules. Recognizing the critical need for transparency and robust cybersecurity measures, the U.S. As part of their fiduciary duties, boards play a key role in the oversight of risks from cybersecurity threats.

article thumbnail

Launching LLM-Based Products: From Concept to Cash in 90 Days

Speaker: Christophe Louvion, Chief Product & Technology Officer of NRC Health and Tony Karrer, CTO at Aggregage

In this exclusive webinar, Christophe will cover key aspects of his journey, including: LLM Development & Quick Wins 🤖 Understand how LLMs differ from traditional software, identifying opportunities for rapid development and deployment.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. Register today! November 14th, 2023 at 9:30am PST, 12:30pm EST, 5:30pm GMT

article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter.

article thumbnail

Upgrading Data Security in a Crisis

Speaker: M.K. Palmore, VP Field CSO (Americas), Palo Alto Networks

In this webinar, you will learn: The future of data security. Preparing for crises that lead to security threats. How to update existing tech stacks to optimize data security. And much more! Thursday September 10th, 2020 at 11AM PDT, 2PM EST, 6PM GMT.

article thumbnail

Secure SaaS Success: Embedded Finance as a Competitive Advantage

Speaker: Ian Hillis, SVP of Growth at Payrix and Worldpay for Platforms

Join us for an exclusive webinar hosted by Ian Hillis, SVP of Growth at Payrix and Worldpay for Platforms, where he’ll explore the significant impact of embedded finance on the software industry!

article thumbnail

How to Avoid the Pain and Cost of PCI Compliance While Optimizing Payments

Speaker: P. Andrew Sjogren, Sr. Product Marketing Manager at Very Good Security, Matt Doka, Co-Founder and CTO of Fivestars, and Steve Andrews, President & CEO of the Western Bankers Association 

PCI compliance can feel challenging and sometimes the result feels like you are optimizing more for security and compliance than you are for business outcomes. They’ll share how to grow your business faster and minimize costs for both security and compliance. This is an exclusive webinar you won't want to miss!

article thumbnail

Recovering from a Cyber Attack

Speaker: Mike Cramer, Director of HIPAA & Data Security at The Word & Brown Companies

If your organization stores data and is connected to the Internet, it is not a matter of “if” a cyber-security incident will happen, but “when.” It takes an organizational mindset which realizes that data privacy and security is a continuous, evolving process, as opposed to a “fire-and-forget” set of steps.