- Activity Feed
- Photos
- Videos
- Blog Posts
- Discussions
- Events
- Friends
- About
Loading ...
"Amazing collection !"
Selecting the right attack surface management vendor is essential for safeguarding sensitive data and securing your organization against vulnerabilities. Attack surface management involves identifying and mitigating risks across your digital…
The Gartner Hype Cycle 2024 shows how existing technologies have been integrated into broader platforms for more comprehensive exposure management.
Key changes in Gartner Hype Cycle 2024:
Exposure Assessment Platforms now include both :…
Key changes in Gartner Hype Cycle 2024:
Exposure Assessment Platforms now include both :…
Cyber Security has rapidly evolved by including AI-driven tools like Generative Pre-trained Transformers (GPTs). Here's an overview of the impactful cyber security GPTs that might be helpful for Chief Information Security Officers (CISOs) and their…
Key Gaps in Today's Supply Chain Security & How to Build Resilience:
Why do usual certifications like ISO 27001 or risk management services don’t see the entire supplier risk?
What additional controls does your organization need if you are…
Why do usual certifications like ISO 27001 or risk management services don’t see the entire supplier risk?
What additional controls does your organization need if you are…
On July 19, 2024, a CrowdStrike update caused a global IT outage, impacting millions of Windows devices. In this article on ‘crowdstrike microsoft outage and what we learned as CISOs,’ we explore the event’s specifics and discuss key lessons for IT…
CISA released 7 Industrial Control Systems (ICS) advisories in July, which provide timely information about current security vulnerabilities and exploits.
1> Johnson Controls Kantech Door Controllers
ICSA-24-184-01 Johnson Controls Kantech Door…
1> Johnson Controls Kantech Door Controllers
ICSA-24-184-01 Johnson Controls Kantech Door…
Simply put,penetration testing as a service or PTaaS is a continuous guard against cyber threats, offering an ongoing cycle of testing that traditional penetration tests don’t provide. This service combines the insights of security experts with the…
An exclusive Fireside Chat at CISOPlatform Summit 2024 with cybersecurity legend Bruce Schneier and Bikash Barai.Bruce is one of the foremost cryptographers and a leading mind in cybersecurity. Often referred to as the "security guru", he is the…
Reuven Cohen, who goes by the Twitter handle @ruv, has recently been experimenting with using GPT to power attack bots. He recently posted this on his Facebook page after being able to create such an attack bot very quickly:
“Autonomous AI Hack…
“Autonomous AI Hack…
Multiple U.S. government agencies have cautioned that the Black Basta ransomware group is actively targeting the healthcare sector along with 12 out of 16 critical infrastructure segments.
The FBI, CISA, and HHS issued an advisory on a Friday,…
The FBI, CISA, and HHS issued an advisory on a Friday,…
In the landscape of ever-evolving cyber threats, how can organizations safeguard their digital assets with efficacy and speed? Continuous threat exposure management (CTEM) stands out as the proactive cybersecurity frontier. This real-time strategy…
Loading ...