Social Network For Security Executives: Help Make Right Cyber Security Decisions
A new study by Cambridge Cybercrime Centre titled Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies concludes that cybercrime is boring and recommends authorities change their strategy to highlight the tedium in order to dissuade the growth of…Continue
Added by Matthew Rosenquist on May 30, 2020 at 9:31pm — No Comments
[Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author |]
What have we learned from this Global event?
Here are some of my thoughts; we learned getting back to basics is paramount.
In the haste to move Millions of people to remote work; many organizations and "experts" published the same message, use a VPN, strong passwords, updated anti-malware/virus solutions, update operating system(s),…
Added by CISO Platform on May 29, 2020 at 4:30pm — No Comments
[Posted on Behalf of Steve King , Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
From CrowdStrike’s 2018 report titled Securing the Supply Chain: “Although almost 90 percent of the respondents believe they are at risk for supply chain attack, companies are still slow to detect, remediate and respond to threats.”
The Cap-1 breach is a classic example of an at-risk company who succumbed to the…
Added by CISO Platform on May 29, 2020 at 4:14pm — No Comments
It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the customer base for the organizations. However, this myriad of benefits is also accompanied by the curse of privacy and security breaches that are encountered by the companies invariably. The distressing increase in the number of cyber-attacks against the companies…Continue
Added by Ray Parker on May 28, 2020 at 12:56pm — No Comments
Being a champion for digital privacy is no easy task. The perception of privacy and its importance is constantly in flux and radically different around the globe. I am honored to be a part of this dynamic and determined community that protects and advocates for an optimal balance of privacy, security, and safety.
Much thanks to…Continue
Added by Matthew Rosenquist on May 27, 2020 at 12:03am — No Comments
I am looking forward to discussing the emerging cybersecurity risks and opportunities of Artificial Intelligence with Carmen Marsh, CEO of Inteligenca, and 'Cyber Risk Leaders' author, Shamane Tan. AI is a tremendously powerful tool that is evolving at a ridiculous rate and being leveraged by both cyber attackers and defenders. It will radically…Continue
Added by Matthew Rosenquist on May 25, 2020 at 9:18pm — No Comments
We all understand the significance of cloud when it comes to economies of scale, reduced time to market, operational effectiveness and ease with which you can deploy applications to it and most of us are good in leveraging those benefits too. But how well do we manage the cloud risks that come along with those benefits? More often than not, the approach is ad hoc and that's predominantly because there is no cloud security architecture to standardize cloud…Continue
Added by Pushkal Mishra on May 23, 2020 at 3:16pm — No Comments
Threat hunting or monitoring is the practice of actively seeking out cyber threats in an organization or network. A threat hunt can be conducted during a security incident, or pre-incident time to discover new and unknown attacks or breaches. Threat hunting requires quality use cases which can run on top of the security data across the organization, and pin point the required information to complete the threat investigation. These use case works on top of the correlation engine provided by…Continue
Added by Neeraj Kumar Singh on May 21, 2020 at 4:00pm — No Comments
"We're a tiny company, why would anyone want our data? It's not like we're making tens of millions in profit"
Unfortunately, I'm familiar with this mindset.
It was only once I got rid of this mindset that I was finally able to give the cyber threat the respect it deserved.
The thing is, the longer we pretend it doesn't…
Added by CISO Platform on May 21, 2020 at 2:30pm — No Comments
The VShield 2020 virtual conference is a can’t-miss cybersecurity event! Friday May 22nd
Bruce Schneier is delivering the keynote and multiple rooms/tracks will be available with many great sessions and informative panels.
I have the honor of being on the Cyber…Continue
Added by Matthew Rosenquist on May 21, 2020 at 6:04am — No Comments
Social sites are the most widely used social networking site with over 2.6 billion monthly active users as of the first quarter of 2020. As a reason if which it has become the number 1 target of hackers.
Phishing still is the most popular attack vector used for hacking Facebook accounts, There are variety of methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake login page which exactly looks like…Continue
Added by SACHIN BP SHETTY on May 20, 2020 at 4:48pm — No Comments
Added by CISO Platform on May 20, 2020 at 3:30pm — No Comments
EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals.
I am excited to join the prestigious ranks of…Continue
Added by Matthew Rosenquist on May 20, 2020 at 7:03am — No Comments
Added by CISO Platform on May 19, 2020 at 6:17pm — No Comments
(Posted on Behalf of Michalis Kamprianis Developing Security Strategies at Suse)
(Posted On Behalf of Pushkal Mishra ,AVP IT & CISO, HDFC ERGO Health Insurance Ltd)
As a security professional we always wonder about new cyber threats and how the world is reacting to those. Since there are multiple industries with their specific risks, where does one get the insights on top cyber issues wreaking havoc on information systems?
With this article, I attempt to answer that by listing top 5 reports that I find useful. These are researched material…Continue
Added by CISO Platform on May 15, 2020 at 12:30pm — No Comments
(Posted on Behalf of Dennis Leber, CISO, University of Tennessee Health Science Center)
From the Military Manual, - "CCD is the use of materials and techniques to hide, blend, disguise, decoy, or disrupt the appearance of military targets and/or their backgrounds. CCD helps prevent an enemy from detecting or identifying friendly troops, equipment, activities, or installations. Properly designed CCD techniques take advantage of the immediate environment and natural and…Continue
Added by CISO Platform on May 15, 2020 at 12:30pm — No Comments
A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position to understand how vulnerable major companies are. There have been various previous reports on this notorious malware…
Added by pritha on May 12, 2020 at 12:22pm — No Comments
Australians have a history of coming together in times of…Continue
Added by Logan Daley on May 12, 2020 at 11:19am — No Comments
Cybersecurity in 2020 will be evolutionary but not revolutionary. Although there is always change and churn, much of the foundational drivers remain relatively stable. Attacks in the next 12 months are likely to persist in ways already known but taking it up-a-notch and that will lead to a steady escalation between attackers and defenders. …Continue
Added by Matthew Rosenquist on May 12, 2020 at 10:00am — No Comments