July 2020 Blog Posts (21)

Is the Coronavirus Creating Data Breaches?

[Posted on Behalf of Dan Lohrmann Chief Strategist & Chief Security Officer Security mentor, Inc. ]

From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how the coronavirus creates new opportunities for cybercriminals.

 Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC…


Added by CISO Platform on July 31, 2020 at 4:18pm — No Comments

A Quantified Approach to Cybersecurity Risk Management

[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services  Information Security Media Group (ISMG) ]
Cybersecurity Risk Assessment should be a hot topic these days. How else can you not only convince your board and management team that you need to do something to protect against cyber-attacks, but also be able to communicate for once in a language they understand?

What if Equifax knew that their risk was quantified at more than $1.4B (as…

Added by CISO Platform on July 31, 2020 at 4:15pm — No Comments

Why You Need to Think Like a Hacker to Keep Your Network Safe

You may not have the resources to employ an army of white-hat hackers to stress test your security infrastructure; most organizations don’t. However, you want to make sure that the resources you do have are used in the most effective way.

It’s smart to invest in security products and spend time developing your capabilities. Cybercrime is more prevalent than ever, and modern attackers have no shortage of methods to choose from. Too often,…


Added by Pete Thurston on July 29, 2020 at 11:36pm — No Comments

Innovation & Growth

[Posted on Behalf of Subbu Iyer Founder and chief Designer Hreemm ]

The Process of Innovation

Globally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably worked when the rate of innovation and the expectations of growth were spaced incrementally. That equation cannot work when the socio-economic demand is exponential both in terms of time and…


Added by CISO Platform on July 29, 2020 at 11:59am — No Comments

When Will You Go Back To The Office – If Ever?

[Posted on Behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer Security mentor, Inc.]
As the governments lift stay-at-home emergency orders, organizations are grappling with what it means to reopen offices. What will change? Will telework be the new normal? Let's explore.

By any measure, the number of professionals working from home (WFH) has skyrocketed during the pandemic. Public and private sector organizations quickly adopted telework…

Added by CISO Platform on July 29, 2020 at 11:55am — No Comments

Amidst working from home, secure the “Home WiFi” network

[Posted on Behalf of Archie Jackson,  Senior Director and Head of IT & IS Incedo Inc]

There is a #global new normal during the #COVID19 #pandemic of working from home. Be it any industry, the mode of operation has limited to the boundaries of residences.

Listing down 10 important measures to strengthen the controls of security & privacy for your Home-Office WiFi.

 1.      Default Router…


Added by CISO Platform on July 29, 2020 at 11:53am — No Comments

Incident Response. Missing?

[Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs]
Incident Response. Picture of a Failed One !

Recent Wipro fiasco on Breach reported by noted security researcher, Brian Krebs, is a study in either lacking incident response, or else, a mismanaged (or shall I use the word as muddled) incident response.
For the uninitiated ...

Kreb reported a potential breach of Wipro, where its systems were compromised and then…

Added by CISO Platform on July 29, 2020 at 11:49am — No Comments

Curve-jumping" in Security Operations and SOAR Technologies

[Posted on Behalf of  Anton Chuvakin Security Strategy - chronicle  Google ] 

Lets think about this together -- can you really jump to the “next curve” in security, or do you have to travel the entire journey from the old ways to the cutting edge?

This is a harder question than it appears and there are temptations on both sides of the argument. Also, there are false answers on both sides, tempting though they may be (e.g.…


Added by CISO Platform on July 27, 2020 at 5:39pm — No Comments

Strategy - How CISOs Build Their Road Map

[Posted on behalf of Gary Hayslip CISO  Softbank Investment advisor]
Recently, I addressed a group of security professionals, and our discussion was on how CISOs develop their strategy. I found many in the audience had no idea how security executives develop strategy, nor were they comfortable that strategic plans could be changed or quickly discarded.

As I sit in an airplane flying to London, I am thinking about my answers that evening. In speaking to the…

Added by CISO Platform on July 27, 2020 at 5:35pm — No Comments

What are are the Top 5 CISO Frustrations?

I was recently asked an interesting question: What are are the Top 5 CISO frustrations with the cybersecurity industry?

After a few minutes of deep thought and half a cup of coffee later (my 4th big cup of the day), this is what I came up with:

Top 5 CISO Frustrations of the Industry:

  1. Maintaining an…

Added by Matthew Rosenquist on July 25, 2020 at 2:07am — No Comments

Emotet - Forever

Emotet, as stated by many threat research group claims to be a Banking Trojan; ever evolving since their entry into threat world. Although Emotet is said to be active since 2013, it was first detected in 2014. Ever since until now (August 2020) they are continuously evolving. The first traces of malware is through a surreptitious MitB (Man-in-the-Browser) attack where the Trojan collects and steals credential information stored on a browser. The second traces were more common where the…


Added by Alston Daril on July 19, 2020 at 1:38pm — No Comments

The 10 Worst Cybersecurity Strategies

Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…

Let’s count them down.  

10. Cyber-Insurance



Added by Matthew Rosenquist on July 17, 2020 at 12:59am — No Comments

Will AI rescue the world from the impending doom of cyber-attacks or be the cause

There has been a good deal of publicized chatter about impending cyberattacks at an unprecedented scale and how…


Added by Matthew Rosenquist on July 8, 2020 at 5:17am — 1 Comment

Security in Super Connected World (IoT Security)

[Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs ]

Introduction to IoT Phenomenon (Internet of Things)

Computing and its pervasiveness

In the last few decades more and mode devices have been connected to the internet and to each other.…


Added by CISO Platform on July 6, 2020 at 5:26pm — No Comments

Cross-post: About Threat Intel Retro-Matching

[Posted on Behalf of  Anton Chuvakin, Security Strategy - chronicle Google] 

So you recall my recent post about TI matching to security telemetry like logs in near real-time? I did say that most threat intelligence (TI, also called“threat data” in this post) comes from past observations of badness. In fact, the whole model of value for threat intelligence is that even though such badness is past for the initial observer, it is a likely future…


Added by CISO Platform on July 6, 2020 at 4:12pm — No Comments

How may I help You (That little Chatbot in your website) !

[Posted on Behalf of Pushkal Mishra, AVP IT & CISO  HDFC ERGO Health Insurance Ltd ]

There has been a wide adoption of A.I. (Artificial Intelligence) in the last few years. You might have seen them in chat rooms or on companies’ websites providing you information about Insurance, Banking products, Customer support or smart speakers or even inside your favorite Barbie doll, now a conversational doll !

As per…


Added by CISO Platform on July 6, 2020 at 4:00pm — No Comments

Crosspost: [Not Really About] Top 10 SIEM Log Sources in Real Life

[Posted on Behalf of  Anton Chuvakin, Security Strategy - chronicle Google] 

One of the most common questions I received in my nalyst years of covering SIEM and other security monitoring technologies was “what data sources to integrate into my SIEM first?”

And of course the only honest answer to this question is: it depends on your security monitoring use cases and how you prioritize them.Naturally, some people then ask…


Added by CISO Platform on July 6, 2020 at 3:49pm — No Comments

Maintaining Data Security & Privacy with Learning Machines

[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS   Incedo Inc]

AI is a huge ecosystem of tools, languages, frameworks with functions ranging from data ingestion, data pre-processing, modeling, model evaluation, integration, visualization, packaging & deployment, etc.

Multiple stakeholders’ groups ranging from traditional software engineers to machine learning engineers, data scientists…


Added by CISO Platform on July 6, 2020 at 3:40pm — No Comments

A Mentor's Advice

[Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor ]

In my 20+ years as an information technology and cybersecurity professional, I have had the privilege to work with and mentor some amazing people. I have learned as a CIO and as a CISO sometimes you don’t always get to pick the teams you build and sometimes you inherit interesting employees from previous leaders. Even with these less than ideal situations, you…


Added by CISO Platform on July 6, 2020 at 3:35pm — No Comments

Is Your Organization Prepared For a Digital Future?

[Posted on Behalf of Subbu Iyer, Founder and chief Designer Hreemm]

In 2015 and 2017, PETER WEILL AND STEPHANIE L. WOERNER surveyed several hundred enterprises, examining both the capabilities needed for transformation and the impacts on performance. Based on our analysis, companies in the future-ready quadrant performed much better than their industry peers. According to the authors whose article is published in the 2018 Winter Edition of…


Added by CISO Platform on July 6, 2020 at 3:28pm — No Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service