October 2020 Blog Posts (52)

(Limited free pass) Blackhat & DEFCON Trainings @'Best Of The Wolrd In Security' 2020

Hello,

We're excited to bring to you some awesome security minds who generously contributed to make security knowledge accessible to the community. We're giving free passes for the community. We request you to tag your security peers and everyone to sign up

All workshops can be found here …

Continue

Added by pritha on October 31, 2020 at 11:30am — No Comments

Bahamas new digital currency will be the next testbed for innovative cybercrime attacks

The government’s Central Bank of the Bahamas has released the world’s first Central Bank Digital Currency (CBDC) - the “SAND DOLLAR”.

This is attracting the interest of cybercriminals as well as security professionals.  As national currencies transform into a digital form, criminals will seek ways to steal and abuse monetary systems at a…

Continue

Added by Matthew Rosenquist on October 30, 2020 at 11:45pm — No Comments

California Privacy Rules Updated to Target Shady Practices

The California Consumer Privacy Act (CCPA) has been around since 2018, as the more protective data privacy legislation of any state, but not all businesses have been acting ethically in their compliance and respect for user privacy. 

As a result, the CA Attorney General has once again updated the CCPA.  This time, to thwart unscrupulous…

Continue

Added by Matthew Rosenquist on October 28, 2020 at 10:05pm — No Comments

Upcoming Cybersecurity Speaking Events

Events are free to join.  Register now!

2020 Cyber Innovators Summit

Register here.  Friday Oct 30th 9am-5:30pm PST…

Continue

Added by Matthew Rosenquist on October 28, 2020 at 1:54am — No Comments

Cybersecurity Awareness Month – Accept My Challenge

October is Cybersecurity Awareness Month.  It is a time to consider the risks we accept everyday when using computers and what we can do to better protect ourselves. 

I have a challenge for each and every person.  Something that will help people individually and everyone collectively.

Let me know if you are up to the challenge and…

Continue

Added by Matthew Rosenquist on October 26, 2020 at 3:34am — No Comments

The NSA knows something you don't

The U.S. National Security Agency knows which vulnerabilities China backed hackers are exploiting the most to gain access to sensitive data.

The Chinese state-sponsored information gathering engine is a vacuum when it comes to acquiring information from foreign companies and countries. 

NSA’s list of critical CVEs to be patched (PDF…

Continue

Added by Matthew Rosenquist on October 24, 2020 at 2:00am — No Comments

Cybersecurity & IoT Showcase 2020 conference

"Why Sacramento is Ripe to be a Cybersecurity Hub" panel discussion, was lively and engaging. Moderated by Carmen Marsh and featuring Malcolm Harkins, Matthew Rosenquist, and George Usi, the panel discussed a broad range of topics including: Why pick Sacramento to start a cybersecurity product or services company, advice…

Continue

Added by Matthew Rosenquist on October 23, 2020 at 11:27pm — No Comments

So, Why is Threat Detection Hard?

While creating a recent presentation, I needed a slide on “threat detection is hard.” And it got me thinking, why is threat detection so hard for so many organizations today? We can trace the “cyber” threat detection to 1986 (…

Continue

Added by Dr. Anton Chuvakin on October 23, 2020 at 10:30pm — No Comments

Charges Against Russian Nation-State Hackers Sends a Message

The U.S. Department of Justice filed charges against six Russian agents, identified as members of the APT group known as Sandworm.  The unsealed documents reveal that the six suspects are all current or have former ties to the Russian foreign intelligence agency, the GRU.  The charges outline how this group is supported and coordinated by the…

Continue

Added by Matthew Rosenquist on October 22, 2020 at 9:59pm — No Comments

Cyber Threats Enhance Phishing with AI and Worm Functions for Rapid Disruption

New phishing malware leverages Artificial Intelligence and worm functionality to rapidly spread to contacts of victims.  By leveraging previously established relationships the malware can bypass technical controls and easily fool new targets into becoming infected. 

This is just another step forward, albeit an interesting and effective…

Continue

Added by Matthew Rosenquist on October 21, 2020 at 4:21am — No Comments

Apple T2 Chip Vulnerability Challenges the Industry

Recent verified reports highlight exploitable vulnerabilities in Apple’s security chip that cannot be patched!  The announcement adds to the growing concerns and shifting perceptions about hardware security.

Hardware-based security has pros and cons.  Many ask if the risk is worth the reward when hardware might be vulnerable.  As consumers,…

Continue

Added by Matthew Rosenquist on October 19, 2020 at 1:53am — No Comments

Is Paying Ransomware Now Illegal?

Security experts say don't pay ransomware, but now the U.S. Treasury Department is now declaring it illegal!  Every company on the Internet must deal with the threat and emerging regulations.  

Ransomware continues to be a growing problem because victims have been rewarding the attackers.  If regulations expand, the option to pay-off the…

Continue

Added by Matthew Rosenquist on October 17, 2020 at 5:48am — No Comments

Breach Trends and Insights – October 2020

This report summarises the top breaches between mid – September till 15th October 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends. 

Most common Breach trends identified…

Continue

Added by CISO Platform on October 16, 2020 at 2:10pm — No Comments

Microsoft's New Tactics Disrupts Trickbot Ransomware

Microsoft and partners have taken down the Trickbot ransomware infrastructure. That is a temporary relief, as the cybercriminals will soon adapt. The bigger picture is how the Microsoft Digital Crimes Unit (DCU) has created a…

Continue

Added by Matthew Rosenquist on October 15, 2020 at 10:05am — No Comments

FireCompass Unveils New AI-Powered Continuous Automated Red Teaming (CART) Platform That Mimics Thousands Of Hackers

Boston October 14, 2020FireCompass today unveils its new artificial intelligence-powered Continuous Automated Red Teaming (CART) platform that mimics thousands of hackers trying to break into an organization. The solution enables organizations to launch continuous safe attacks to identify blind spots before hackers do. Created by a team of serial cybersecurity entrepreneurs, FireCompass’ product is already…

Continue

Added by Priyanka Aash on October 15, 2020 at 10:00am — No Comments

On the Wings of Time: Past, Present and Future of Radio Communication [Harshit Agarwal]

We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.

Key Points To Be Discussed

  • loT: Transformational Impact across Verticals
  • RF Fundamentals
  • Joys of the Past
  • Current status of Industry & Sutra for Mitigation
  • A Glimpse of the Future
  • Case Study and…
Continue

Added by CISO Platform on October 14, 2020 at 5:06pm — No Comments

Should Governments be Responsible for Protecting the Internet?

Does society want governments to take on the role of protecting the Internet? Should the Internet be considered a Critical Infrastructure and therefore be overseen by governments? Will such actions undermine privacy and liberty or will it be demanded by citizens to protect personal access and online security?

The…

Continue

Added by Matthew Rosenquist on October 14, 2020 at 2:35am — No Comments

Zero Trust VPN and VPN Security [Speaker: Debojit Maitra]

We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.

Key Points To Be Discussed

  • What is VPN
  • Tech Challenges 
  • How VPN Works 
  • Existing General VPN Architecture 
  • Challenges with Today's VPN 
  • Zero Trust Model 
  • Zero Trust Network Access
  • Zero…
Continue

Added by CISO Platform on October 13, 2020 at 4:37pm — No Comments

Benchmarking Deception Solutions

With the evolving threat landscape, breaches are becoming increasingly common. As per Ponemon Institute, in 2017, the average time required to detect a breach was 191 days and the average time required to contain a breach was 66 days. These time frames can have a significant impact on businesses relying on technology for their continued operations. Deception as a strategy has always been a critical element for detecting threats and adversary behavior.…

Continue

Added by Priyanka Aash on October 13, 2020 at 9:39am — No Comments

Top DLP Vendors

Frequently Compared DLP Products

Forcepoint Vs. Intel Security
InfoWatchVs. Clearswift
Data Resolve Vs. Somansa…
Continue

Added by Priyanka Aash on October 13, 2020 at 9:36am — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */