Data breaches are among the most severe threats facing organizations in today's digital landscape. As cybercriminals become more sophisticated, businesses of all sizes are at risk of falling victim to attacks that can compromise sensitive information
Blog (498)
The National Public Data breach has been a nightmare, exposing names, addresses, birthdates, emails, phone numbers, and Social Security Numbers of countless individuals — including mine.
As a California resident, I have the legal right to demand that
It is my absolute honor to be in this month's issue of The Cyber Express by Cyble, discussing the importance of knowing your cyber adversaries, how good leadership is crucial to success, and the ways AI will change cybersecurity forever! I made the c
The decentralized finance (DeFi) and cryptocurrency industries are being targeted by North Korean social engineering schemes in highly personalized and convincing ways.
Here is an example that the FBI is showcasing:
1. A person from your dream company,
CISO Platform 100, 2024 (India):
Applications for the Top 100 CISO Awards is open for 2024. Kindly fill in your responses asap.
We are very happy to announce that nominations are now open for the 16th Edition of Top 100 CISO Awards - India's 1st Secu
limits of innovation and interaction they exist in front of thousands of ethical questions that can influence people including players and society in general. Solving these ethical questions is not only the corporate issue but can also be related to
The cybersecurity landscape is evolving at an unprecedented pace, driven by rapid technological advancements and increasingly sophisticated cyber threats. What was sufficient yesterday, will be lacking for tomorrow. Organizations must stay ahead of t
In this insightful video, industry experts explore the transformative impact of Zero Trust on cybersecurity, discussing its role in addressing modern security challenges. As cyber threats evolve and traditional perimeter defenses become outdated, Zer
In an insightful panel discussion hosted by the CISO platform, experts converged to delve into the technical challenges and strategies associated with implementing the Digital Personal Data Protection (DPDP) Act. Moderated by Rajiv Nandwani, Global I
Selecting the right attack surface management vendor is essential for safeguarding sensitive data and securing your organization against vulnerabilities. Attack surface management involves identifying and mitigating risks across your digital footprin
In today's digital landscape, where cyber threats constantly evolve, security testing has become integral to the software development lifecycle (SDLC). Ensuring that your software is secure from the onset is not just a best practice; it's a necessity
The Gartner Hype Cycle 2024 shows how existing technologies have been integrated into broader platforms for more comprehensive exposure management.
Key changes in Gartner Hype Cycle 2024:
Exposure Assessment Platforms now include both :
- vulnerabil
Cyber Security has rapidly evolved by including AI-driven tools like Generative Pre-trained Transformers (GPTs). Here's an overview of the impactful cyber security GPTs that might be helpful for Chief Information Security Officers (CISOs) and their s
I am looking forward to speaking at the CISO/Executive Leadership Forum this October 24th-25th in Napa California! This will be such a stellar event and great opportunity to network with amazing leaders.
Check out more details at: https://mind-fluence
Here’s a capability matrix that organizations can refer to when evaluating potential attack surface management or external attack surface management or EASM vendors.
Capability Matrix for Evaluating EASM Vendors
This blog discusses essential questions that organizations should consider when evaluating potential EASM vendors, focusing on features, support, and integration capabilities.
External Attack Surface Management (EASM) is a critical component in ide
The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, such as academic papers. According to reports, OpenA
California’s Department of Motor Vehicles will implement a blockchain to prevent vehicle title fraud. They will use Ava Labs’s Avalanche blockchain to allow over 39 million residents to claim and access their vehicle titles.
The online service is int
Tackling the biggest problems in cybersecurity requires superb insights and collaboration across the industry. This CISO Advisory Board will be a catalyst for constructive communication, practical innovation, and a showcase for leadership that drives
Held on 30th May, Thursday, at Shangri-La in Bangalore, the CISOPlatform Summit is known as Asia's largest IT security conference. This year's summit continued its tradition of fostering collaboration and helping the community make better security de
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
16th CISOPlatform 100 Awards
- Description:
16th CISO Platform, Top 100 Awards
Top 100 Awards is India's 1st & Oldest CISO Awards, happening on 17-18 October at Chennai, Mahabalipuram, India
Click here for the agenda & details: https://www.cisoplatform.com/top-100-ciso-awards-2024Click here to nominate: …
- Created by: Priyanka Aash