Featured Blog Posts (179)

Fireside Chat: Future of Offensive Attack Simulation - Strategies, Tools & Techniques

In our recent Fireside chat episode in association with FireCompass, between Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, we discussed a bunch of things related to the cybersecurity practices that are gaining momentum and about what the future holds. 

What are some…

Continue

Added by Priyanka Aash on November 24, 2020 at 3:00pm — No Comments

The 10 Worst Cybersecurity Strategies

Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…

Let’s count them down.  

10. Cyber-Insurance

No…

Continue

Added by Matthew Rosenquist on July 17, 2020 at 12:59am — No Comments

Hands on Workshop: Shifting From Pentest To Continuous Automated Red Teaming (CART) @ Best In the world Of Security Summit - 2020



FireCompass is conducting a two-day Hands-on workshop on “Shifting from Pentest to Continuous Automated Red Teaming (CART)” @ Best In the world Of Security Summit - 2020 

Click here to register

CISO Platform Virtual Conference brings together the best of…

Continue

Added by Priyanka Aash on November 4, 2020 at 8:30pm — No Comments

(Limited free pass) Blackhat & DEFCON Trainings @'Best Of The Wolrd In Security' 2020

Hello,

We're excited to bring to you some awesome security minds who generously contributed to make security knowledge accessible to the community. We're giving free passes for the community. We request you to tag your security peers and everyone to sign up

All workshops can be found here …

Continue

Added by pritha on October 31, 2020 at 11:30am — No Comments

CISSP Cheat Sheet for Security & Risk Management - Part 1

This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech.

For reference click here

Added by CISO Platform on September 17, 2020 at 5:00pm — No Comments

Announcing Call For Speakers @ Best Of World In Security Conference

I am highly excited to tell you the 'Call For Speakers' for 'Best Of The World In Security' Conference is now open 

We are more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks of this year. 

>> Link…

Continue

Added by pritha on September 28, 2020 at 1:00pm — No Comments

FireCompass Unveils New AI-Powered Continuous Automated Red Teaming (CART) Platform That Mimics Thousands Of Hackers

Boston October 14, 2020FireCompass today unveils its new artificial intelligence-powered Continuous Automated Red Teaming (CART) platform that mimics thousands of hackers trying to break into an organization. The solution enables organizations to launch continuous safe attacks to identify blind spots before hackers do. Created by a team of serial cybersecurity entrepreneurs, FireCompass’ product is already…

Continue

Added by Priyanka Aash on October 15, 2020 at 10:00am — No Comments

Why You Need to Think Like a Hacker to Keep Your Network Safe

You may not have the resources to employ an army of white-hat hackers to stress test your security infrastructure; most organizations don’t. However, you want to make sure that the resources you do have are used in the most effective way.

It’s smart to invest in security products and spend time developing your capabilities. Cybercrime is more prevalent than ever, and modern attackers have no shortage of methods to choose from. Too often,…

Continue

Added by Pete Thurston on July 29, 2020 at 11:36pm — No Comments

Short Guide On Attack Surface Analysis

A report by Frost & Sullivan found that more than 80% of survey respondents admit to using non-approved applications in their jobs.If you don’t know what to protect, then you cannot protect.

Creating an asset inventory is the first step of any cyber security management function. However due rapid digitization, cloud adoption, IoT adoption and agile disperse teams, 3rd party integrations etc cyber…

Continue

Added by CISO Platform on October 24, 2019 at 12:00pm — No Comments

Data Security and Threat Models

This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post— so expect more posts about that.

Let’s first get this out of the way: there are absolutely security controls that are NOT…

Continue

Added by Dr. Anton Chuvakin on May 8, 2020 at 11:00am — No Comments

The Essential Eight: Application Hardening

Part 6 of 8: Application Hardening

What Is It?  Think of it kind of like spring cleaning on top of a minimalist lifestyle where you keep only what you absolutely need after taking stock of what you have. Many applications are installed with defaults (you know the Next-Next-Next-Next-OK…

Continue

Added by Logan Daley on June 22, 2020 at 5:04am — No Comments

Will AI rescue the world from the impending doom of cyber-attacks or be the cause

There has been a good deal of publicized chatter about impending cyberattacks at an unprecedented scale and how…

Continue

Added by Matthew Rosenquist on July 8, 2020 at 5:17am — 1 Comment

(Free Tool Inside) Critical “SMBleed”, Vulnerability : Are You Affected

This blog was originally contributed by Apoorv Saxena, technical team, FireCompass over here…



Continue

Added by pritha on June 30, 2020 at 4:55pm — No Comments

I’m a CISO, what’s next?

 [Posted on Behalf of Gary Hayslip CISO Softbank Investment advisor]



Over the years in my career, I have heard some variation of this question from many of my peers. Usually, the discussion starts over a cold beverage as we catch up and discuss how our current roles and the companies we work for have issues, note to the reader everyone has issues, and that leads to the inevitable “now what, is there something else?” Basically, they have…

Continue

Added by CISO Platform on June 15, 2020 at 5:56pm — No Comments

Are you working from home?

[Posted on Behalf of Pushkal Mishra, AVP IT & CISO HDFC ERGO Health Insurance Ltd.]
While the world is battling with COVID-19, Information security professionals have a double duty to do.



1. Take all the precaution to keep the Coronavirus away on the personal front



2. Manage the IT risks that come along while facilitating Work From Home (WFH) for the organizations they work for



Let’s focus on point No. 2 here. With COVID-19, the…
Continue

Added by CISO Platform on June 15, 2020 at 8:10pm — No Comments

The CISO Job and Its Short Tenure

[Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor]



Recently, I have written and spoken on the subject of CISO burnout. I have stated my belief that the job is maturing so fast, it's harming many of the security professionals who serve in its varied positions. While speaking about this subject and the importance of self-care for security professionals to manage their stress, I also found another topic that is of great…

Continue

Added by CISO Platform on June 17, 2020 at 5:01pm — No Comments

Teaching AI to be Evil with Unethical Data

An Artificial Intelligence (AI) system is only as good as its training. For AI Machine Learning (ML) and Deep Learning (DL) frameworks, the training data sets are a crucial element that defines how the system will operate. Feed it skewed or biased information and it will create a flawed inference engine. …

Continue

Added by Matthew Rosenquist on July 4, 2020 at 10:43pm — No Comments

10 Areas of Change in Cybersecurity for 2020

Cybersecurity in 2020 will be evolutionary but not revolutionary.  Although there is always change and churn, much of the foundational drivers remain relatively stable.  Attacks in the next 12 months are likely to persist in ways already known but taking it up-a-notch and that will lead to a steady escalation between attackers and defenders. …

Continue

Added by Matthew Rosenquist on May 12, 2020 at 10:00am — No Comments

You've got Mail!

You've got Mail!

While the world continues to battle with the Corona pandemic, there is another pandemic unfolding in digital space. Businesses and people are seeing an unprecedented onslaught of cyberattacks. As organisations try to maintain the business continuity and keep their…

Continue

Added by Rajesh Jain on May 9, 2020 at 1:58pm — No Comments

Featured Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */