Featured Blog Posts (182)

I’m a CISO, What’s Next: New Opportunities & More


[Posted on Behalf of Gary Hayslip CISO Softbank Investment advisor]

Over the years in my career, I have heard some variation of this question from many of my peers. Usually, the discussion starts over a cold beverage as we catch up and discuss how our current roles and the companies we…


Added by CISO Platform on June 15, 2020 at 5:30pm — No Comments

Technology Stack for Ransomware Protection

With Ransomware attacks becoming increasingly frequent, we thought of putting together a list of technologies that can help organizations protect themselves against ransomware attacks. Please note that even though this blog discusses technology measures, this does NOT mean people & process are secondary. There’s no single technology that…


Added by pritha on November 28, 2019 at 3:30pm — No Comments

Missing the Big Picture from the SolarWinds Hack

The cybersecurity industry is consumed with scale and effectiveness of one of the biggest hacks in recent memory.  The emerging narrative and stories are missing important pieces of the puzzle.  The attackers, likely a nation-state, gained unprecedented access to the U.S. government, military, critical infrastructure, and most major…


Added by Matthew Rosenquist on December 16, 2020 at 4:27am — No Comments

Why You Need to Think Like a Hacker to Keep Your Network Safe

You may not have the resources to employ an army of white-hat hackers to stress test your security infrastructure; most organizations don’t. However, you want to make sure that the resources you do have are used in the most effective way.

It’s smart to invest in security products and spend time developing your capabilities. Cybercrime is more prevalent than ever, and modern attackers have no shortage of methods to choose from. Too often,…


Added by Pete Thurston on July 29, 2020 at 11:36pm — No Comments

See Why Continuous Automated Red Teaming (CART) Is The Future Of Security Testing

In today's rapidly changing environment, threat actors are using an arsenal of new and sophisticated techniques that make attacks unrecognizable. With a plethora of products and a rapidly shifting landscape of threat and risk, cybersecurity remains elusive or possible as impossible as the "happiness problem". 

While the…


Added by Priyanka Aash on December 8, 2020 at 4:30pm — No Comments

Fireside Chat: Future of Offensive Attack Simulation - Strategies, Tools & Techniques

In our recent CISO Platform Fireside chat in association with FireCompass, we had Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, who discussed a bunch of things related to the cybersecurity practices that are gaining momentum and about what the future holds. 

What are some ongoing or upcoming…


Added by Priyanka Aash on November 24, 2020 at 3:00pm — No Comments

The 10 Worst Cybersecurity Strategies

Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you are…

Let’s count them down.  

10. Cyber-Insurance



Added by Matthew Rosenquist on July 17, 2020 at 12:59am — No Comments

Hands on Workshop: Shifting From Pentest To Continuous Automated Red Teaming (CART) @ Best In the world Of Security Summit - 2020

FireCompass is conducting a two-day Hands-on workshop on “Shifting from Pentest to Continuous Automated Red Teaming (CART)” @ Best In the world Of Security Summit - 2020 

Click here to register

CISO Platform Virtual Conference brings together the best of…


Added by Priyanka Aash on November 4, 2020 at 8:30pm — No Comments

(Limited free pass) Blackhat & DEFCON Trainings @'Best Of The Wolrd In Security' 2020


We're excited to bring to you some awesome security minds who generously contributed to make security knowledge accessible to the community. We're giving free passes for the community. We request you to tag your security peers and everyone to sign up

All workshops can be found here …


Added by pritha on October 31, 2020 at 11:30am — No Comments

CISSP Cheat Sheet for Security & Risk Management - Part 1

This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech.

For reference click here

Added by CISO Platform on September 17, 2020 at 5:00pm — No Comments

Announcing Call For Speakers @ Best Of World In Security Conference

I am highly excited to tell you the 'Call For Speakers' for 'Best Of The World In Security' Conference is now open 

We are more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks of this year. 

>> Link…


Added by pritha on September 28, 2020 at 1:00pm — No Comments

FireCompass Unveils New AI-Powered Continuous Automated Red Teaming (CART) Platform That Mimics Thousands Of Hackers

Boston October 14, 2020FireCompass today unveils its new artificial intelligence-powered Continuous Automated Red Teaming (CART) platform that mimics thousands of hackers trying to break into an organization. The solution enables organizations to launch continuous safe attacks to identify blind spots before hackers do. Created by a team of serial cybersecurity entrepreneurs, FireCompass’ product is already…


Added by Priyanka Aash on October 15, 2020 at 10:00am — No Comments

Short Guide On Attack Surface Analysis

A report by Frost & Sullivan found that more than 80% of survey respondents admit to using non-approved applications in their jobs.If you don’t know what to protect, then you cannot protect.

Creating an asset inventory is the first step of any cyber security management function. However due rapid digitization, cloud adoption, IoT adoption and agile disperse teams, 3rd party integrations etc cyber…


Added by CISO Platform on October 24, 2019 at 12:00pm — No Comments

Data Security and Threat Models

This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post— so expect more posts about that.

Let’s first get this out of the way: there are absolutely security controls that are NOT…


Added by Dr. Anton Chuvakin on May 8, 2020 at 11:00am — No Comments

The Essential Eight: Application Hardening

Part 6 of 8: Application Hardening

What Is It?  Think of it kind of like spring cleaning on top of a minimalist lifestyle where you keep only what you absolutely need after taking stock of what you have. Many applications are installed with defaults (you know the Next-Next-Next-Next-OK…


Added by Logan Daley on June 22, 2020 at 5:04am — No Comments

Will AI rescue the world from the impending doom of cyber-attacks or be the cause

There has been a good deal of publicized chatter about impending cyberattacks at an unprecedented scale and how…


Added by Matthew Rosenquist on July 8, 2020 at 5:17am — 1 Comment

(Free Tool Inside) Critical “SMBleed”, Vulnerability : Are You Affected

This blog was originally contributed by Apoorv Saxena, technical team, FireCompass over here…


Added by pritha on June 30, 2020 at 4:55pm — No Comments

Are you working from home?

[Posted on Behalf of Pushkal Mishra, AVP IT & CISO HDFC ERGO Health Insurance Ltd.]
While the world is battling with COVID-19, Information security professionals have a double duty to do.

1. Take all the precaution to keep the Coronavirus away on the personal front

2. Manage the IT risks that come along while facilitating Work From Home (WFH) for the organizations they work for

Let’s focus on point No. 2 here. With COVID-19, the…

Added by CISO Platform on June 15, 2020 at 8:10pm — No Comments

The CISO Job and Its Short Tenure

[Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor]

Recently, I have written and spoken on the subject of CISO burnout. I have stated my belief that the job is maturing so fast, it's harming many of the security professionals who serve in its varied positions. While speaking about this subject and the importance of self-care for security professionals to manage their stress, I also found another topic that is of great…


Added by CISO Platform on June 17, 2020 at 5:01pm — No Comments

Featured Monthly Archives











Security Trends and Emerging Technologies That A CISO Should Adopt In 2021

Started by Priyanka Aash yesterday. 0 Replies

What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2021   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */