May 2020 Blog Posts (27)

Misunderstanding the Economic Factors of Cybercrime

A new study by Cambridge Cybercrime Centre titled Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies concludes that cybercrime is boring and recommends authorities change their strategy to highlight the tedium in order to dissuade the growth of…

Continue

Added by Matthew Rosenquist on May 30, 2020 at 9:31pm — No Comments

COVID - 19 The Disrupter

[Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author |]

What have we learned from this Global event?



Here are some of my thoughts; we learned getting back to basics is paramount.



In the haste to move Millions of people to remote work; many organizations and "experts" published the same message, use a VPN, strong passwords, updated anti-malware/virus solutions, update operating system(s),…

Continue

Added by CISO Platform on May 29, 2020 at 4:30pm — No Comments

So You Think You Are Ready for Third Party Risk Management, eh?"

[Posted on Behalf of Steve King , Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]

From CrowdStrike’s 2018 report titled Securing the Supply Chain: “Although almost 90 percent of the respondents believe they are at risk for supply chain attack, companies are still slow to detect, remediate and respond to threats.”



The Cap-1 breach is a classic example of an at-risk company who succumbed to the…

Continue

Added by CISO Platform on May 29, 2020 at 4:14pm — No Comments

Making your System Impenetrable with Penetration Testing

It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the customer base for the organizations. However, this myriad of benefits is also accompanied by the curse of privacy and security breaches that are encountered by the companies invariably. The distressing increase in the number of cyber-attacks against the companies…

Continue

Added by Ray Parker on May 28, 2020 at 12:56pm — No Comments

Top 50 Privacy Leaders by Thinkers360

Being a champion for digital privacy is no easy task.  The perception of privacy and its importance is constantly in flux and radically different around the globe.  I am honored to be a part of this dynamic and determined community that protects and advocates for an optimal balance of privacy, security, and safety.

Much thanks to…

Continue

Added by Matthew Rosenquist on May 27, 2020 at 12:03am — No Comments

Global Virtual Book Club – How AI will Change Cybersecurity

I am looking forward to discussing the emerging cybersecurity risks and opportunities of Artificial Intelligence with Carmen Marsh, CEO of Inteligenca, and 'Cyber Risk Leaders' author, Shamane Tan.  AI is a tremendously powerful tool that is evolving at a ridiculous rate and being leveraged by both cyber attackers and defenders.  It will radically…

Continue

Added by Matthew Rosenquist on May 25, 2020 at 9:18pm — No Comments

Cloud Security Architecture

We all understand the significance of cloud when it comes to economies of scale, reduced time to market, operational effectiveness and ease with which you can deploy applications to it and most of us are good in leveraging those benefits too. But how well do we manage the cloud risks that come along with those benefits? More often than not, the approach is ad hoc and that's predominantly because there is no cloud security architecture to standardize cloud…

Continue

Added by Pushkal Mishra on May 23, 2020 at 3:16pm — No Comments

THREAT MONITORING USE CASE APPROACH

Threat hunting or monitoring is the practice of actively seeking out cyber threats in an organization or network. A threat hunt can be conducted during a security incident, or pre-incident time to discover new and unknown attacks or breaches. Threat hunting requires quality use cases which can run on top of the security data across the organization, and pin point the required information to complete the threat investigation. These use case works on top of the correlation engine provided by…

Continue

Added by Neeraj Kumar Singh on May 21, 2020 at 4:00pm — No Comments

Small businesses don't need Cyber Security, right? Think again!

(Posted on behalf of Sam Jones Cyber Essentials Consultant - Cyber Tec security)
 
 

"We're a tiny company, why would anyone want our data? It's not like we're making tens of millions in profit"

Unfortunately, I'm familiar with this mindset.

It was only once I got rid of this mindset that I was finally able to give the cyber threat the respect it deserved.

The thing is, the longer we pretend it doesn't…

Continue

Added by CISO Platform on May 21, 2020 at 2:30pm — No Comments

VShield 2020 Cybersecurity Conference

The VShield 2020 virtual conference is a can’t-miss cybersecurity event!  Friday May 22nd

Bruce Schneier is delivering the keynote and multiple rooms/tracks will be available with many great sessions and informative panels. 

I have the honor of being on the Cyber…

Continue

Added by Matthew Rosenquist on May 21, 2020 at 6:04am — No Comments

Social networking sites are number 1 target of hackers.

Social sites are the most widely used social networking site with over 2.6 billion monthly active users as of the first quarter of 2020. As a reason if which it has become the number 1 target of hackers.

1. Phishing

Phishing still is the most popular attack vector used for hacking Facebook accounts, There are variety of methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake login page which exactly looks like…

Continue

Added by SACHIN BP SHETTY on May 20, 2020 at 4:48pm — No Comments

How mature is your Application Security Program?

(Posted on Behalf of Pushkal Mishra AVP IT & CISO, HDFC ERGO Health Insurance Ltd)
Business applications are vital for the successful functioning of any organization. Therefore, managing their information security risks are just as important as the business itself. If I ask about different measures you take to ensure security of your applications, you might reply with few initiatives such as periodic secure…
Continue

Added by CISO Platform on May 20, 2020 at 3:30pm — No Comments

Joining the EC-Council International Advisory Board for CISOs

EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals. 

I am excited to join the prestigious ranks of…

Continue

Added by Matthew Rosenquist on May 20, 2020 at 7:03am — No Comments

Information Security and Risk Management as a business enabler

(Posted on Behalf of Michalis Kamprianis Developing Security Strategies at Suse)
A common problem for information security professionals, is that security is perceived as a business blocker; hindering the operational efficiency and adding controls that make everybody's life more difficult. But is this actually the case?



Sometimes it is...

Indeed sometimes, it is the case. Someone has the most brilliant idea: let's implement these security controls to…
Continue

Added by CISO Platform on May 19, 2020 at 6:17pm — No Comments

Three approaches to cyber security budgeting

(Posted on Behalf of Michalis Kamprianis Developing Security Strategies at Suse)

I often get into discussions about budgets and how much a company should invest in its security program. There is no easy answer because the problem we are trying to…

Continue

Added by CISO Platform on May 19, 2020 at 5:24pm — 1 Comment

Top 5 Information Security Reports

(Posted On Behalf of Pushkal Mishra ,AVP IT & CISO, HDFC ERGO Health Insurance Ltd)

As a security professional we always wonder about new cyber threats and how the world is reacting to those. Since there are multiple industries with their specific risks, where does one get the insights on top cyber issues wreaking havoc on information systems?

 With this article, I attempt to answer that by listing top 5 reports that I find useful. These are researched material…

Continue

Added by CISO Platform on May 15, 2020 at 12:30pm — No Comments

Cover, Concealment, and Decoy - how does that apply to cybersecurity?

(Posted on Behalf of Dennis Leber, CISO, University of Tennessee Health Science Center)

From the Military Manual, - "CCD is the use of materials and techniques to hide, blend, disguise, decoy, or disrupt the appearance of military targets and/or their backgrounds. CCD helps prevent an enemy from detecting or identifying friendly troops, equipment, activities, or installations. Properly designed CCD techniques take advantage of the immediate environment and natural and…

Continue

Added by CISO Platform on May 15, 2020 at 12:30pm — No Comments

Maze Ransomware Attacks Cognizant

A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position to understand how vulnerable major companies are. There have been various previous reports on this notorious malware…

Maze Ransomware Hits Cognizant

Continue

Added by pritha on May 12, 2020 at 12:22pm — No Comments

A Path To The New Normal

Original Post by David Wain, National Practice Manager — Education at Data#3 Limited

Australians have a history of coming together in times of…

Continue

Added by Logan Daley on May 12, 2020 at 11:19am — No Comments

10 Areas of Change in Cybersecurity for 2020

Cybersecurity in 2020 will be evolutionary but not revolutionary.  Although there is always change and churn, much of the foundational drivers remain relatively stable.  Attacks in the next 12 months are likely to persist in ways already known but taking it up-a-notch and that will lead to a steady escalation between attackers and defenders. …

Continue

Added by Matthew Rosenquist on May 12, 2020 at 10:00am — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service