logo
#

Latest news with #Cofounder

Identity Security: Overcoming Challenges And Embracing Innovation
Identity Security: Overcoming Challenges And Embracing Innovation

Forbes

time01-07-2025

  • Business
  • Forbes

Identity Security: Overcoming Challenges And Embracing Innovation

Bojan Simic is the Cofounder and CEO of HYPR, a provider of passwordless MFA and identity assurance solutions. Current identity security strategies are inadequate. My company's survey of 750 global IT security decision makers in January found that only about half of organizations avoided a breach last year, with 87% of incidents rising from basic identity vulnerabilities, such as misused credentials and verification gaps, necessitating a reevaluation of security approaches. To combat modern threats such as social engineering, deepfakes and impersonation, organizations must shift from traditional methods, adopt innovative solutions and redefine trust in identity security. However, challenges may impede progress. Reimagining Identity Security: Overcoming Persistent Challenges Enhancing identity security is now a crucial priority that demands strategic insight and collaboration across industries. Organizations face ongoing challenges, like outdated authentication methods and new threats from generative AI. Despite the significant barriers to robust identity security, the potential for innovation is equally strong. These pain points highlight a mix of challenges and opportunities for progress: 1. The Stubborn Legacy of Passwords: For decades, the cost of password-related breaches and the persistent inconvenience they impose have exposed them as a fundamental security failure. As a primary driver of security incidents, their continued reliance is inexcusable. 2. Misinterpreting Zero Trust: Zero trust is more than a buzzword—it represents a paradigm shift. Many organizations fail to understand that it is not just about acquiring new tools or branding a new security strategy. It involves rethinking how we establish trust in today's digital age. 3. Balancing Security And User Experience: Too often, security measures compromise usability. When security feels burdensome, users are less likely to adopt it effectively. The goal must be to implement robust defenses that integrate seamlessly into the user experience. 4. Phishing's Enduring Threat: Phishing attacks persist, regardless of how advanced defenses become. Human error and weak credentials remain the most common means by which attackers gain access. 5. The Checkbox Mentality: Security is more than a compliance exercise. It requires a genuine commitment to reducing risk. A checkbox mentality leads to vulnerabilities and fosters a false sense of protection. Absolute security demands a proactive, ongoing effort that embraces best practices such as passwordless authentication and zero-trust strategies. 6. Complexity In Cybersecurity Tools: The cybersecurity market has been saturated with tools that promise the world, yet often lead to frustration. If a tool is not intuitive and difficult to implement, it will not be used effectively. Organizations require straightforward solutions that facilitate deployment and management while delivering enterprise-grade security. 7. Supply Chain Vulnerabilities: Recent high-profile software supply chain attacks highlight the interconnected nature of risks. The Lazarus Group used malicious npm packages to steal credentials and cryptocurrency wallet data, and to install backdoors. Attackers also uploaded counterfeit Python packages mimicking legitimate ChatGPT tools to deceive developers and exploit the popularity of AI development. As an industry, we must advocate for greater transparency and more robust security measures from vendors to guarantee that technology is thoroughly vetted and founded on trusted standards. 8. Shifting From Reactive To Proactive Security: Organizations often spend excessive time reacting to rather than preventing threats. 9. Bridging The Cybersecurity Skills Gap: The cybersecurity talent shortage is well-known. While not an overnight solution, developing accessible and intuitive technologies for users and administrators enables teams to focus on what matters most. 10. Challenging The Status Quo: Lastly, one of the greatest frustrations is the resistance to change. In cybersecurity, clinging to outdated practices only exacerbates vulnerabilities. Organizations must embrace innovation and challenge established norms to reap the benefits of meaningful progress. The Identity Renaissance Because of the challenges above, companies are starting to awaken to the need for the Identity Renaissance, a term coined by my company, HYPR, to signify the growing and crucial shift in thinking more deeply about identity security. This movement emphasizes embracing modern, phishing-resistant authentication and prioritizing securing workforce access as a strategic imperative. This means taking decisive actions, including: 1. Implementing An Identity-First Security Model: Identity assurance should be foundational. Phishing-resistant authentication should replace weak fallback methods to safeguard workforce access. 2. Fixing Onboarding Processes: Manual identity checks and document-based verifications are vulnerable to errors. AI-driven identity verification can enhance security while eliminating unnecessary friction. 3. Eliminating Legacy Authentication: Passwords and fragmented security systems create inefficiencies. Companies must prioritize secure, scalable alternatives, such as FIDO passkeys. 4. Unifying Physical And Digital Access: Separate physical entry from digital authentication creates vulnerabilities. Smart credentials streamline access across devices, applications and locations, providing seamless integration. 5. Aligning Security Across Teams: Identity security is not just an IT issue; it impacts HR, security and identity teams. Collaboration and leadership support are crucial to a strong security culture. This is more than a technological shift; it's a movement towards lasting security, resilience and digital trust. Industry leaders must standardize phishing-resistant authentication, improve interoperability and ensure that identity solutions are accessible to all businesses. Brands must treat identity security as a central pillar of their enterprise strategy, not just a compliance requirement. By embracing a zero-trust mindset, simplifying onboarding and aligning security with usability, businesses can create authentication frameworks that are seamless and resilient. Those who take bold steps in AI-driven identity verification, eliminate weak fallback methods and unify access will secure their systems and redefine digital trust. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Why We Must Prioritize Solid-State Batteries For Drone Technology
Why We Must Prioritize Solid-State Batteries For Drone Technology

Forbes

time01-07-2025

  • Business
  • Forbes

Why We Must Prioritize Solid-State Batteries For Drone Technology

Siyu Huang is the CEO and Cofounder of Factorial. Drones have transformed from novelties to necessities. From battlefield reconnaissance to wildfire monitoring, unmanned aircraft are reshaping how we approach national security and emergency response. But there's a critical weakness holding back their potential: the batteries that power them. The limitations of current lithium-ion battery technology create an impossible tradeoff between flight time and payload capacity. Military commanders shouldn't have to choose between keeping a drone in the air longer or equipping it with better sensors. Emergency response teams shouldn't have to recall drones for recharging in the middle of tracking a wildfire's spread. What's Standing In Our Way? Current lithium-ion batteries have powered the first generation of drones admirably, but they face fundamental limitations that go far beyond mere engineering challenges. This creates an inherent tradeoff between power and energy density, forcing drones to sacrifice either range or payload capacity. The batteries struggle in extreme temperatures, risking failure in arctic conditions and dangerous overheating in high temperatures, precisely the challenging environments where military and emergency response missions must operate. For missions requiring extended flight times or high-power bursts, these limitations aren't just inconvenient—they're mission-critical constraints. This technological bottleneck is compounded by serious supply chain vulnerabilities caused by the U.S.'s reticence to embrace new battery technology. In fact, 70% to 90% of the battery industry is run by Chinese companies, with Japan and South Korea holding minority market shares, and the U.S. coming in fourth for market share. This overwhelming dependence on foreign lithium-ion battery suppliers presents a major vulnerability, not just in terms of supply chain reliability, but as a national security risk, as evidenced by the Department of Defense's actions regarding Chinese battery manufacturer CATL. As political tensions between China and the U.S. reverberate through global supply chains and markets, American drone manufacturers are increasingly bearing the consequences. If we continue to overlook the risks posed by our lack of a domestic battery manufacturing presence, we are effectively choosing to jeopardize our military readiness at a time when resilience is more critical than ever. Embracing Solid-State Battery Technology Fortunately, American innovation is opening a path forward. Solid-state battery technology represents a genuine breakthrough in energy storage, offering superior performance, enhanced safety and greater resilience in extreme environments. Independent testing and research from Argonne National Laboratory, Cornell and Duke, among others, demonstrate the national interest in unlocking this technology. At Factorial, our work designing solid-state batteries for consumer-focused mobility is just one example of their broad potential—but the consensus across the scientific and engineering communities makes clear how transformative solid-state technology will be for the future of energy. The advantages extend far beyond raw performance numbers. Solid-state batteries solve the temperature challenge that has long plagued military operations. Their electrolytes remain stable in extremely low temperatures, ensuring reliable performance in Arctic reconnaissance missions while withstanding exposure to 100° C without the thermal runaway risks that plague traditional batteries. This resilience opens up new operational possibilities across climates and conditions. And these are only examples being done for applications within orbit. Since 2024, the University of Wollongong in Australia has been testing solid-state's ability to withstand sub-zero temperatures for use in space. Consider the implications: Surveillance drones could monitor critical infrastructure for hours longer. Emergency response aircraft could carry more sophisticated sensors while maintaining extended flight times. Military reconnaissance platforms could operate reliably in the harshest conditions, from arctic temperatures to desert heat. This technology is ready for deployment. My company recently announced a partnership with a Canadian developer of long-range, dual-use unmanned aerial systems (UAS), which I believe demonstrates solid-state's ease of integration. Unlike electric vehicles, which require years of supply chain ramp-up, we've found that solid-state batteries can be integrated into drone platforms in as little as 12 months. While research continues to advance, the technology's potential is already widely recognized across industries. In 2024, Bank of America's Institute reported that loosening regulations are creating strong tailwinds for the convergence of solid-state batteries and drone applications. This creates a unique first-mover opportunity for solid-state batteries in drones and UAS—well ahead of adoption in other transportation sectors. The manufacturing capability is already in place: At Factorial, we've achieved yield rates exceeding 85% at our production facility. What Can We Do To Realize This Future? Bringing this technology to scale requires a coordinated effort between industry and government. The Department of Defense has recognized the strategic importance of advanced battery technology, but recognition alone isn't enough. We need action on three fronts: 1. Increased government funding for domestic battery manufacturing. The semiconductor industry has shown how targeted investment can rebuild critical capabilities. 2. Procurement policies that prioritize advanced battery technologies. Clear market signals will accelerate private sector investment. 3. Deeper collaboration between military planners, drone manufacturers and battery developers to ensure new technologies meet operational needs. The stakes extend beyond military applications. The same technology that can enable longer-range military drones could transform emergency response, infrastructure inspection and urban air mobility. But these benefits will only materialize if we commit to developing and manufacturing advanced batteries here in America. Non-government agencies and organizations also have a critical role to play here. By investing in pilot projects, partnering with battery innovators and supporting scale-up, they can help prove and deploy solid-state technology faster. Prioritizing rigorous safety testing, sustainable sourcing and public education will set industry benchmarks and build the market confidence needed for adoption. Those who lead will shape the future of drone technology—and secure a competitive edge as solid-state batteries become the new standard. Other nations are investing heavily in next-generation battery technology and manufacturing. The question isn't whether solid-state batteries will transform drone capabilities—it's whether America will lead or follow. The path forward is clear: We must invest in solid-state battery development and manufacturing today to secure America's drone capabilities for tomorrow. The technology exists. The expertise exists. What's missing is the national commitment to bring them together at scale. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

The Future (E)State Of SecOps
The Future (E)State Of SecOps

Forbes

time24-06-2025

  • Business
  • Forbes

The Future (E)State Of SecOps

Monzy Merza is the Cofounder and CEO of Crogl with deep expertise in security strategy, threat intelligence and go-to-market execution. If your security operations are understaffed, it's about to get much worse. The time arc of business computing and security operations indicates that, over time, technology dependency will increase, and business requirements will become more diverse. This will expand the business' risk surface, allowing attackers to exploit it. And this will, in turn, create more work for security teams. The SecOps work will require data from a larger number of systems across multiple footprints. I conducted a thought exercise on the future of businesses and their security teams, considering the aggregated inflection points. I was curious to explore how highly constrained security professionals will work in a few years' time. SecOps Is A Function Of A Business User's Productivity Bandwidth A modern business user is significantly more productive than their predecessor 10 years ago. Today's business user would be lost without high-speed internet connectivity in planes, apps that remind, autorespond, mine, connect, autocorrect and generate documents in a flash. Five years from now, we will see even greater bandwidth and computing power in the hands of individuals. Businesses will accomplish a lot more with each augmented human, to the point that the future users may become super agents enhanced by AI. We see a glimpse of that in today's meetings: participants are screen sharing, chatting, taking notes, resolving problems and making decisions—all while ordering lunch online. These observations indicate an increase in the volume of output, a rise in the variety of work and a diversification in the modes of work. We envision a future where businesses will have increased flexibility in terms of work locations and devices used. And this will give rise to the types of decisions they make—both for work and for device/tool use. Think of sprawling environments spanning multiple cloud and on-premise locations, complex segmentation and asset classification and varying levels of roles, permissions and access. For teams that are in charge of managing, orchestrating and safeguarding humans, AIs, customers and data—this means an explosion of complexity. Complexity of data, complexity of processes, complexity of interaction, complexity of translation from one system, location or individual to another. This means that any type of work that requires analysis and decision making, as opposed to automation, will need to depend on semantic and knowledge layers rather than robotic AI. What Does This Mean For Your Cybersecurity Team? The security teams will be challenged to safeguard a complex footprint of usage. Devices, networks, clouds, servers, and data stores, agents and LLMs will need monitoring, compliance, threat detection, investigation and remediation. With this larger footprint, they'll be dealing with complicated threat patterns and the ability to translate information from one system to another, map activities and queries, trace back to connect differently named items and adapt to a continuously shifting threat landscape—contemporary analysis systems will be insufficient. Operationally, this is a data and process problem. If the business user's bandwidth has increased significantly, then the security team's bandwidth must increase, too. So, what is the core bandwidth bottleneck for the security teams? My view: It's the knowledge of the data and the tool competency to apply the knowledge to a given problem. Today's security teams have tens of tools and fragmented data lakes. It's natural to say, 'Just put all your data in one place and use a single system for data analysis.' However, I assure you that there is no example in nature or technology where that notion has been successful in a complex system. What's needed is a bandwidth multiplier. A knowledge system. A self-learning, self-adjusting knowledge layer that records and translates semantics, learns processes, adapts to a continuously changing environment, and can be used to orchestrate various defenses, allowing security teams to stop being overwhelmed and control their own destiny. This isn't some made-up, fabricated expression of complexity. Business users are using knowledge systems already, whether it's a chatbot in a spreadsheet or delivery predictor in a supply chain operation. Those systems are multipliers because they are tightly focused on the user's "jobs to be done." A knowledge engine that focuses on the security operator's job can be a multiplier, too. How CIOs And CISOs Can Prepare Today For What's Coming When considering all the changes that are likely to occur, think about the gravitational forces that exist within organizations. While technology changes can influence the what, how and where the work is done, some constants exist. Systems that get work done will continue to exist, and they will need to be maintained, enhanced and updated to constantly changing customer or organizational needs. Those processes will, therefore, need to be maintained, enhanced and updated. Customer data, business/organizational confidential data, sensitive payment data and trade secrets will continue to need protection. The know-how and relationships that make each organization unique will both evolve and need to be continually updated. As a result, making investments that are steeped in data, process and continuous learning will be imperative. CIOs and CISOs must invest in products, technologies and services that are both flexible and build a foundational augmentative knowledge layer for your organization. Use this lens for your next technology investments—how well does it enhance the efficiency of my processes, how well does it safeguard the privacy of my organization's assets, and how well can it adapt to the changing nature of the technology landscape and business needs? Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Resilience In Action: Building Adaptive Strength For Market Leadership
Resilience In Action: Building Adaptive Strength For Market Leadership

Forbes

time23-06-2025

  • Business
  • Forbes

Resilience In Action: Building Adaptive Strength For Market Leadership

Padmakumar Nair, CEO & Cofounder of Ennoventure Inc. True market leadership isn't built during stable times—it's forged through uncertainty. While speed and innovation grab headlines, resilience is what sustains companies through turbulence and positions them to lead when others falter. Strategic agility includes not just the ability to act quickly but also to build buffers, say no when necessary and manage internal responses with discipline. Here are five often-overlooked strategies that have helped my company build adaptive strength and long-term market leadership. 1. Know When Not To Act: Strategic Avoidance As A Competitive Advantage Agility is not just about seizing every opportunity; you must also know which ones to avoid. For instance, we deliberately stayed away from industries that demanded short turnaround cycles we couldn't sustainably meet. While this meant walking away from immediate revenue, it saved us from overextending our teams and eroding brand trust. By holding the line on strategic focus, you can protect your bandwidth for sectors where you could lead with excellence. Sometimes, not playing is how you win the long game. 2. Invest In Efficient Slack: Buffers That Don't Break The Bank Resilience isn't built during a crisis. It's built during calm periods. But traditional slack can feel like waste unless it's strategically designed. To design strategic slack effectively, companies should treat underutilized periods as valuable windows for capability-building rather than cost-cutting. Use this time to invest in systems that enhance long-term agility. Examples of this could include developing on-demand pricing models, strengthening analytics capabilities or training teams on tools that improve operational efficiency. Quiet cycles are ideal for refining internal processes, optimizing cost structures and running low-risk pilots in marketing or sales. Additionally, prepare modular, ready-to-activate solutions like cost-based service packages or client-facing tools that can be deployed quickly when the market shifts. The goal is to offer clients scalable, value-driven alternatives without compromising on service levels. When done right, this kind of strategic slack positions your company as a reliable, forward-thinking partner that clients can trust and grow with, especially in uncertain times. For instance, during lean quarters, we didn't cut back on everything. Even when cash was tight, we maintained bench strength, continued internal training and ran strategic offsites and reviews of objectives and key results. These 'inefficiencies' became our edge during growth rebounds, allowing us to ramp up faster than competitors who had gone into survival mode. It was a lesson in building agility without waiting for urgency. 3. Keep The Team In The Loop: Internal Response As A Strategic Lever In high-stakes environments, the rumor mill can be more damaging than the market itself. Transparent communication helps maintain alignment and energy. For instance, when we hit a difficult funding patch, we didn't shy away from talking about it. Leadership opened up Q&A sessions and shared runway metrics and strategy trade-offs. I've seen firsthand that prioritizing this kind of internal openness can strengthen cohesion, reduce attrition and rally a team around critical priorities. Agility isn't just about external pivots; it's about internal readiness. 4. Monitor And Calibrate Relentlessly: Agility Through Weekly Precision Big strategic shifts often come from small, continuous adjustments. Review your marketing and financial data every week, not just monthly or quarterly. When you notice sudden traffic spikes or cost anomalies, you can act within days by optimizing campaigns or reallocating spend before losses are compounded. This is the approach we've taken, and we've seen that this granular control can create a rhythm of responsiveness that sets you apart in volatile conditions. 5. Build A Resilient Pipeline: Growth That Doesn't Ride On A Few Bets Over-reliance on a handful of clients or channels can turn minor changes into major risks. Resilience means diversification—not just in ideas but also in revenue flows. Make it a point to maintain a wide, flexible stack of pipeline opportunities across verticals and geographies. When an unexpected delay stalls deals in one region or major pipeline client, you'll be in a better position to still meet quarterly targets by closing in another. This approach made our revenue engine more stable and predictable—key ingredients for market leadership. Resilience As A Strategic Weapon Companies that invest in buffers, clarity and focus are in a better position to withstand shocks and lead industries forward. Strategic agility is not just reactive—it's preemptive. It must be built into your culture, your planning cycles and your communication style. In a world of constant change, resilience is not just about surviving. It's the foundation for leading. Forbes Business Council is the foremost growth and networking organization for business owners and leaders. Do I qualify?

AI Agents Alone Won't Automate The Enterprise—But They Can Make It Smarter
AI Agents Alone Won't Automate The Enterprise—But They Can Make It Smarter

Forbes

time17-06-2025

  • Business
  • Forbes

AI Agents Alone Won't Automate The Enterprise—But They Can Make It Smarter

Tarun Raisoni, CEO & Cofounder at Gruve Inc. Enterprise systems follow the rules by design. For decades, platforms like ERP, CRM and HR software have powered the backbone of business. But today's enterprises face new pressure: Move faster, do more with fewer resources and adapt in real time. The problem? Most systems they rely on were built for structure, not flexibility. And while APIs were once thought to be the fastest way to integrate business platforms, they've added more complexity and rigidity. That's where AI agents come in. AI agents bring a new layer of intelligence to enterprise automation. They don't just follow instructions, they interpret context, make decisions and take action with minimal human input. From classifying documents to triaging support tickets, they handle the messy, unstructured work that traditional systems struggle with. But AI agents aren't a standalone solution. While they excel at flexibility, they fall short when managing tasks where consistency and compliance are non-negotiable. That's why the smartest companies aren't choosing between traditional systems and AI. They're building hybrid automation models that combine the best of both. AI adoption is no longer about if but how. With 92% of companies planning to increase AI investment over the next three years, the focus is shifting from deployment to impact. Unlike traditional enterprise platforms, AI agents adapt. They interpret unstructured data, respond to changing inputs and take autonomous action, coordinating across systems without detailed instructions. Think of them less as static tools, more like dynamic teammates who can reason and act. This flexibility shines in context-heavy functions: • Customer Service: Classifying tickets, suggesting responses or resolving issues based on sentiment and history • Finance: Scanning invoices, flagging anomalies and feeding clean data into ERP systems • IT: Monitoring infrastructure and triggering remediation in real time What makes AI agents powerful isn't just their autonomy; rather, it's their ability to reason using enterprise-specific data. They fill gaps that traditional systems can't. Tools like Salesforce's Agentforce recommend the next best actions within CRMs, while Glean's agents let teams automate workflows like onboarding without writing code. These agents don't replace core systems; they extend them, adding intelligence where structure alone falls short. AI agents thrive when they're not working in isolation. To work effectively, they need orchestration. They must connect to the enterprise systems they rely on and the human teams that guide them. This orchestration layer is what enables hybrid automation to function. It ensures that: • AI agents hand off tasks to structured systems (like ERPs or CRMs) for compliant execution. • Human reviewers can step in when needed, especially for exceptions or sensitive decisions. • Processes remain auditable, traceable and aligned with business logic. We already see this across HR systems, IT workflows and facilities teams through automatically generating accounts, scheduling orientation sessions and provisioning equipment. However, those actions are governed by a central orchestration layer that ensures each step follows company policy, involves human oversight where needed and keeps the process compliant and consistent across regions. This isn't just automation; it's automation with guardrails that enable AI agents to move from experimentation into production. The more enterprises deploy AI agents, the more they need to think of them as a new kind of digital workforce. That means: • Oversight: AI agents need clear boundaries on what they're allowed to do and when to escalate. • Training: Just like employees, agents need context: domain-specific vocabularies, evolving workflows and access to the correct data. • Performance Management: Teams should monitor, evaluate and refine agents over time to improve output and prevent drift. Security and trust are also critical. Unlike rule-based systems, agents can make novel decisions, which makes explainability, audit trails and human-in-the-loop (HITL) frameworks essential. AI agents aren't a replacement; they're a multiplier. Their real value lies in being woven into the systems and processes that businesses already trust. Hybrid automation makes that possible, blending structure with intelligence to unlock new levels of scale and speed. In a landscape defined by pressure to move faster and do more, this isn't just a smarter model. It's the one built to last. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store