Social Network For Security Executives: Network, Learn & Collaborate
[Posted on Behalf of Dan Lohrmann Chief Strategist & Chief Security Officer Security mentor, Inc. ]
From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how the coronavirus creates new opportunities for cybercriminals.
Trevor is working from home for the first time. He loves the freedom and flexibility, but doesn’t read his company’s new BYOD policy. Sadly, he misses the fact that his home PC…
Added by CISO Platform on July 31, 2020 at 4:18pm — No Comments
Added by CISO Platform on July 31, 2020 at 4:15pm — No Comments
You may not have the resources to employ an army of white-hat hackers to stress test your security infrastructure; most organizations don’t. However, you want to make sure that the resources you do have are used in the most effective way.
It’s smart to invest in security products and spend time developing your capabilities. Cybercrime is more prevalent than ever, and modern attackers have no shortage of methods to choose from. Too often,…
ContinueAdded by Pete Thurston on July 29, 2020 at 11:36pm — No Comments
[Posted on Behalf of Subbu Iyer Founder and chief Designer Hreemm ]
The Process of Innovation
Globally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably worked when the rate of innovation and the expectations of growth were spaced incrementally. That equation cannot work when the socio-economic demand is exponential both in terms of time and…
Added by CISO Platform on July 29, 2020 at 11:59am — No Comments
Added by CISO Platform on July 29, 2020 at 11:55am — No Comments
[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc]
There is a #global new normal during the #COVID19 #pandemic of working from home. Be it any industry, the mode of operation has limited to the boundaries of residences.
Listing down 10 important measures to strengthen the controls of security & privacy for your Home-Office WiFi.
1. Default Router…
Added by CISO Platform on July 29, 2020 at 11:53am — No Comments
Added by CISO Platform on July 29, 2020 at 11:49am — No Comments
[Posted on Behalf of Anton Chuvakin Security Strategy - chronicle Google ]
Lets think about this together -- can you really jump to the “next curve” in security, or do you have to travel the entire journey from the old ways to the cutting edge?
This is a harder question than it appears and there are temptations on both sides of the argument. Also, there are false answers on both sides, tempting though they may be (e.g.…
Added by CISO Platform on July 27, 2020 at 5:39pm — No Comments
Added by CISO Platform on July 27, 2020 at 5:35pm — No Comments
I was recently asked an interesting question: What are are the Top 5 CISO frustrations with the cybersecurity industry?
After a few minutes of deep thought and half a cup of coffee later (my 4th big cup of the day), this is what I came up with:
Top 5 CISO Frustrations of the Industry:
Added by Matthew Rosenquist on July 25, 2020 at 2:07am — No Comments
Emotet, as stated by many threat research group claims to be a Banking Trojan; ever evolving since their entry into threat world. Although Emotet is said to be active since 2013, it was first detected in 2014. Ever since until now (August 2020) they are continuously evolving. The first traces of malware is through a surreptitious MitB (Man-in-the-Browser) attack where the Trojan collects and steals credential information stored on a browser. The second traces were more common where the…
ContinueAdded by Alston Daril on July 19, 2020 at 1:38pm — No Comments
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…
Let’s count them down.
No…
ContinueAdded by Matthew Rosenquist on July 17, 2020 at 12:59am — No Comments
I am excited to be recognized with such great cybersecurity though-leaders!
Now more than ever, cybersecurity is becoming a critical pillar to the proliferation of digital technology. Trust in the devices and systems is crucial that people, companies, and governments embrace and rely upon. Every day, the innovation, investment, and adoption…
ContinueAdded by Matthew Rosenquist on July 15, 2020 at 2:30am — No Comments
There has been a good deal of publicized chatter about impending cyberattacks at an unprecedented scale and how…
ContinueAdded by Matthew Rosenquist on July 8, 2020 at 5:17am — 1 Comment
[Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs ]
Introduction to IoT Phenomenon (Internet of Things)
Computing and its pervasiveness
In the last few decades more and mode devices have been connected to the internet and to each other.…
Added by CISO Platform on July 6, 2020 at 5:26pm — No Comments
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
So you recall my recent post about TI matching to security telemetry like logs in near real-time? I did say that most threat intelligence (TI, also called“threat data” in this post) comes from past observations of badness. In fact, the whole model of value for threat intelligence is that even though such badness is past for the initial observer, it is a likely future…
ContinueAdded by CISO Platform on July 6, 2020 at 4:12pm — No Comments
[Posted on Behalf of Pushkal Mishra, AVP IT & CISO HDFC ERGO Health Insurance Ltd ]
There has been a wide adoption of A.I. (Artificial Intelligence) in the last few years. You might have seen them in chat rooms or on companies’ websites providing you information about Insurance, Banking products, Customer support or smart speakers or even inside your favorite Barbie doll, now a conversational doll !
As per…
Added by CISO Platform on July 6, 2020 at 4:00pm — No Comments
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
One of the most common questions I received in my nalyst years of covering SIEM and other security monitoring technologies was “what data sources to integrate into my SIEM first?”
And of course the only honest answer to this question is: it depends on your security monitoring use cases and how you prioritize them.Naturally, some people then ask…
Added by CISO Platform on July 6, 2020 at 3:49pm — No Comments
[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc]
AI is a huge ecosystem of tools, languages, frameworks with functions ranging from data ingestion, data pre-processing, modeling, model evaluation, integration, visualization, packaging & deployment, etc.
Multiple stakeholders’ groups ranging from traditional software engineers to machine learning engineers, data scientists…
Added by CISO Platform on July 6, 2020 at 3:40pm — No Comments
[Posted on Behalf of Gary Hayslip, CISO Softbank Investment advisor ]
In my 20+ years as an information technology and cybersecurity professional, I have had the privilege to work with and mentor some amazing people. I have learned as a CIO and as a CISO sometimes you don’t always get to pick the teams you build and sometimes you inherit interesting employees from previous leaders. Even with these less than ideal situations, you…
ContinueAdded by CISO Platform on July 6, 2020 at 3:35pm — No Comments
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
1999
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 0 Likes
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies 0 Likes
(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue
Tags: #COVID19
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service