Category: Trust

The Evolution of Media: Visualizing a Data-Driven Future

This post is by Jeff Desjardins from Visual Capitalist

Do you believe that Data > Opinion?
There are only a few days left in backing the VC App.

The Evolution of Media: Visualizing a Data-Driven Future

In today’s highly-connected and instantaneous world, we have access to a massive amount of information at our fingertips.

Historically, however, this hasn’t always been the case.

Time travel back just 20 years ago to 2002, and you’d notice the vast majority of people were still waiting on the daily paper or the evening news to help fill the information void.

In fact, for most of 2002, Google was trailing in search engine market share behind Yahoo! and MSN. Meanwhile, early social media incarnations (MySpace, Friendster, etc.) were just starting to come online, and all of Facebook, YouTube, Twitter, and the iPhone did not yet exist.

The Waves of Media So Far

Every so often, the dominant form of communication is upended by new technological developments and changing societal preferences.

These transitions seem to be happening faster over time, aligning with the accelerated progress of technology.

  • Proto-Media (50,000+ years)
    Humans could only spread their message through human activity. Speech, oral tradition, and manually written text were most common mediums to pass on a message.
  • Analog and Early Digital Media (1430-2004)
    The invention of the printing press, and later the radio, television, and computer unlock powerful forms of one-way and cheap communication to the masses.
  • Connected Media (2004-current)
    The birth of Web 2.0 and social media enables participation and content creation for everyone. One tweet, blog post, (Read more...)

How Investing in Cybersecurity Could Give ClickUp up to a $350 Million Valuation Boost

This post is by Georgian Team from Georgian

ClickUp is the world’s only all-in-one productivity platform that flexes to the way people want to work. It replaces all individual workplace productivity tools with a single, unified platform that includes project management, document collaboration, spreadsheets, chat and now whiteboards.

As one of the fastest-growing SaaS platforms in the world, ClickUp has helped more than 800,000 teams and millions of users lead a more productive life. Customers trust ClickUp because it provides tremendous value, but also because they’re comfortable with how it stores and protects their sensitive information.

Cybersecurity is a growing concern for all businesses and individuals. Cybersecurity Ventures estimates that the impact of cybercrime could hit a whopping $10.5 trillion by 2025. The cost of cyberattacks is immense, as is the value of building and maintaining customer trust

With that in mind, ClickUp made key investments to its cybersecurity infrastructure to stay ahead of the curve. Georgian led ClickUp’s $100 million Series B in December 2020, and through that relationship, ClickUp became our first-ever cybersecurity deep engagement partner.

ClickUp invested in the security foundations for long-term success, including hiring a strong team and building the right architecture. Together, we developed a strong security foundation that brought the topic of trust to the forefront as a board-level discussion.

ClickUp wanted to continue its incredible growth while securing its future

While many high-growth companies choose to delay these investments in favor of driving short-term results, protecting clients’ data is a “top priority” for ClickUp, says Founder and CEO (Read more...)

5 Steps to Building Your First Security Architecture

This post is by Alex Manea from Georgian

Imagine you’ve been asked to lead security at a company that doesn’t have a strong program in place or wants to significantly upgrade their existing one — either because they suspect it might not be effective, or because a recent cyberattack has proven that to be the case. You’ve obviously got a daunting task ahead, so how do you go about it, and more importantly, where do you even start?

If you work at a startup or growth stage company, chances are you’ve either encountered this scenario in the past, are in this type of situation right now, or will face it in the near future. Maybe you’re a founder or senior employee who has volunteered (or been voluntold) to lead cybersecurity, or you’re an experienced security leader hired to build out the new security program.

I’ve been in this position multiple times and now advise CEOs, CTOs, CISOs and other security leaders on the most effective ways to build out their internal security architecture. While every company and situation is different, there are some approaches that work better than others. 

I’d like to share these approaches and highlight some of the common pitfalls to help kickstart your cybersecurity journey. With that in mind, here’s a step-by-step framework that can act as a guide for starting, or improving, your cybersecurity infrastructure.

Step 1: Map Out Your Current Systems

The first step of any complex task is fact-finding, so before you start building anything, you’ll want to have detailed knowledge (Read more...)

Building a Competitive Data Moat Starts with Privacy

This post is by Jessica Galang from Georgian

As we’ve mentioned in our blog on how we invest in R&D at Georgian, widely available ML, NLP, and speech processing tools are making it easier for companies to build rudimentary AI systems. 

This is a challenge for companies that have spent the last few years building a moat around their in-house ML and NLP technologies, as technology itself is no longer a sustainable differentiator. At the same time, access to more data is a key factor in developing better and more useful machine learning models and driving more utility and value from data. There is a unique opportunity to build a moat around data. 

But what does that mean, and how can companies start the process of building a data moat? We caught up with Parinaz Sobhani, Head of Applied Research at Georgian, to explain why privacy is an important part of building a data moat, and some privacy preserving techniques to consider to help overcome privacy concerns. 

Customer buy-in comes before the data moat

For B2B companies, before even beginning the process of creating a data moat, it will be important to communicate value for clients. It’s easier for B2C tech companies like Facebook to think about how their data moat can create positive network effects, since they are providing similar services to all of these customers and their goal is to increase users on the platform. 

Enterprise customers are more invested in protecting their data, and may be wary of letting others use it. But, (Read more...)

Hiring Your First Security Leader

This post is by Alex Manea from Georgian

If cybercrime were a country, its GDP would be the third-largest in the world, and its economy would be one of the fastest-growing.

I know that sounds far-fetched, and to be honest, I wish it was. But in 2015, the World Economic Forum estimated the total economic impact of cybercrime to be approximately $3 trillion. Cybersecurity Ventures estimates that in 2021, this cost will double to $6 trillion, trailing only the GDP of the U.S. and China. By 2025, it is projected to nearly double again to a whopping $10.5 trillion.

After spending 12 years as a cybersecurity leader and practitioner, I’ve spent the past 3 years helping founders, CEOs, and senior executives earn customer trust and leverage it to accelerate their growth. And while security is obviously a critical building block, there’s an even more fundamental piece that needs to be in place first: accountability.

As a startup or growth-stage company, the single most effective thing you can do to build and protect customer trust is to build out an effective cybersecurity team and give them the tools and influence they need to be successful. But if you’re like most founders, you’re not sure where to begin. I’ve helped numerous companies in this exact position, and today I’d like to share some of my learnings to help kickstart your cybersecurity journey.

Getting Started

The most common trap I see CEOs fall into is the false sense of security that comes from being a small business. (Read more...)

How To Spot Fake News

This post is by Omri Wallach from Visual Capitalist

How to Spot Fake News

Can I share this graphic?
Yes. Visualizations are free to share and post in their original form across the web—even for publishers. Please link back to this page and attribute Visual Capitalist.
When do I need a license?
Licenses are required for some commercial uses, translations, or layout modifications. You can even whitelabel our visualizations. Explore your options.
Interested in this piece?
Click here to license this visualization.

How To Spot Fake News

“Fake news” used to be a relatively uncommon problem, but over the last decade, and especially during the COVID-19 pandemic, increasing consumption of news and articles has caused misinformation to run wild.

Far from a new concept, misinformation and cherry-picked stories have been used throughout history as a form of propaganda or information warfare. However, the rise of social media as a hub for sharing articles has spread “fake news”—false or misleading information presented as legitimate news—all over the internet.

Fueled further by increasing polarization, as well as the use of the term by former U.S. President Donald Trump to also refer to negative coverage (whether legitimate or misinformed), it seems more difficult than ever to separate trustworthy from misleading sources.

With this in mind, we combined guidance from non-profit journalism project First Draft News and the International Federation of Library Associations and Institutions (IFLA) to create this guide for understanding “fake news” and how to spot it.

The Different Types of “Fake News”

In order to spot (Read more...)

Episode 133: Tackling Digital Disinformation with Kathryn Harrison

This post is by Jon Prial from Georgian

It used to be you could trust what you saw. With the prevalence of deep fakes and other synthetic media, today it isn’t always so easy knowing what is real and what isn’t. Kathryn Harrison is our guest on this episode of the Georgian Impact Podcast. She is the founder and CEO of the DeepTrust Alliance and FixFake, a company with the data and expertise to find fakes and fight fraud.

Who is Kathryn Harrison?

Kathryn Harrison is the founder and CEO of the DeepTrust Alliance, a non-profit building the solutions and ecosystem to tackle deep fakes and misinformation. Prior to founding the DeepTrust Alliance, Kathryn spent nearly a decade at IBM. Kathryn began her career in financial services at Gerson Lehrman Group in New York and Hong Kong. Kathryn has a Bachelor of Science the School of Foreign Service at Georgetown University, an MBA from the Wharton School and an MA from the Lauder Institute both at the University of Pennsylvania.

The post Episode 133: Tackling Digital Disinformation with Kathryn Harrison appeared first on Georgian.

Episode 131: The Challenges of Scaling Your Business With Slack’s Allan Leinwand

This post is by Jon Prial from Georgian

Is there such a thing as a problem people wish they had? When it comes to challenges in scaling your business, the answer is yes. Allan Leinwand is our guest on this episode of the Georgian Impact Podcast. He is the Senior Vice President of Engineering at Slack. This is a person who knows all about scaling.

Listen to every episode: iTunes | Spotify | Google Play | SoundCloud | Stitcher | RSS

You’ll Hear About:

● Allan’s previous experience helping other major companies scale.
● The key components of scale and where your focus should be.
● How your engineering team should approach scaling.
● Slack’s Request for Comments approach to scaling and innovation.
● How product management teams should think about scaling.
● The importance of transparency when dealing with customer problems, in order to preserve trust.

Who is Allan Leinwand?

Allan Leinwand is responsible for engineering and operations at Slack.

Before joining Slack, Allan was Chief Technology Officer at ServiceNow, where he was responsible for overseeing all technical aspects and strategy. He has co-founded and held senior leadership positions at multiple companies and was a venture capital investor for seven years.

Allan previously served as an adjunct professor at the University of California, Berkeley where he taught on the subjects of computer networks, network management and network design. He (Read more...)