Social Network For Security Executives: Help Make Right Cyber Security Decisions
Hi ...has anyone explored O365 security features/policies - Data localisation, audit and e-discovery, restrictions on 3rd party Teams collaboration, data retention policies, call recording and screen…Continue
Hi, Can anybody suggest good patch management tool to manage all software vendors updates.[Posted on Behalf of CISO Platform member]Continue
Does someone has an incident detection and response process document for cyber breach? [Posted on Behalf of CISO Platform member]Continue
Is still zoom is not secure ? What is your views and which is better [Posted on Behalf of CISO Platform Member]Continue
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
Biometrics, while an element of data security, is a unique attribute that should be treated in an extraordinary fashion.
Passwords and MFA data are useful to attackers, but facial, retina and fingerprint scans open a whole new world of threat.
DNA is also coming soon.
[Posted on Behalf of Rajeev Shukla, Founder and CEO, Castellum Labs]
The world around you is altering in irrevocable ways. Software/s is eating the whole sectors, not just the jobs, anymore. Within next decade, "The Enterprises" and "The Jobs", will take on a very different meaning. Some key questions ... !
How and what will be job profile of the future?
What would it mean for people who are to manage…
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
Let me ask you this: do smaller businesses (say, SMBs) get more security vendor lies than large enterprises? My past analyst experience certainly seems to suggest so. When I was an analyst, the most ridiculous claims, the craziest “features” and the sleaziest marketing decks were most often seen from the vendors that target just such businesses. The word “target” here is…Continue