article thumbnail

What Executives Should Know About Shift-Left Security

CIO Business Intelligence

Shift-left security” is the concept that security measures, focus areas, and implications should occur further to the left—or earlier—in the lifecycle than the typical phases that used to be entry points for security testing and protections. How did the term shift-left security originate?

article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO Business Intelligence

Back in 2001, as I was just entering the venture industry, I remember the typical VC reaction to a start-up pitch was, “Can’t Microsoft replicate your product with 20 people and a few months of effort, given the resources they have?” Artificial intelligence (AI) in 2023 feels a bit like déjà vu to me.

Data 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: William Lidster

SecureWorld News

W illiam Lidster has been with AAA Washington since August of 2017, serving as the leader of its information security an d compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.

article thumbnail

Five Thoughts from the White House Summit on Cybersecurity and Consumer Protection

CTOvision

More than most industries, the security community really is a community and must be bound by trust. An interesting corollary to this is whether, as larger companies get more capable with their security, we will see hackers moving down-market to target smaller companies in increasingly sophisticated ways.

Security 150
article thumbnail

Tech Moves: Expedia board director Skip Battle resigns; Madrona promotions; Vacasa’s new CFO

GeekWire

Cybersecurity startup CI Security hired Steve Sedlock as chief revenue officer and promoted Kristoffer Turner to VP of security operations for its Critical Insight Security Program. The 9-year old company provides security technology and analysts, with a focus on healthcare, financial and government organizations.

Groups 81
article thumbnail

The Sony Hack in Context

CTOvision

The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. In connection with these losses the recently retired Director of the National Security Agency has stated, "In fact, in my opinion, it''s the greatest transfer of wealth in history,".

article thumbnail

Top 15 project management certifications

CIO Business Intelligence

From hardware and software upgrades to ongoing security patches, to application development and the rollout of software itself, project managers keep your teams on task and productive. 11, 2001, terrorist attacks to address issues of cyberterrorism and the information security of nations at large.