LinkedIn is a great communication tool for business professionals that informs, provides opportunities, and fosters collaboration — which is exactly why it is attractive to sophisticated cyber adversaries, including aggressive nation state actors, wh
Blog (975)
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an a
Fraudsters are flooding Discord and other social media platforms with ads for hundreds of polished online gaming and wagering websites that lure people with free credits and eventually abscond with any cryptocurrency funds deposited by players. Here’
I will be really, really honest with you — I have been totally “writer-blocked” and so I decided to release it anyway today … given the date.
So abit of history first. So, my “SOC visibility triad” was released on August 4, 2015 as a Gartner blog (it
ProPublica is reporting:
Microsoft is using engineers in China to help maintain the Defense Department’s computer systems—with minimal supervision by U.S. personnel—leaving some of the nation’s most sensitive data vulnerable to hacking from its lead
Microsoft faces ongoing, systemic cybersecurity failures rooted in blind spots within its very organizational design. These vulnerabilities repeatedly result in serious product blunders and damaging breaches. This has once again become evident with t
I froze when the question came in. If you work in cyber, you’ll know this question all too well. It’s the one that continues to resurface, both in boardrooms and at industry events:
“Why are people still the weakest link?”
Yes, it was familiar. Yes
The Chinese have a new tool called Massistant.
- Massistant is the presumed successor to Chinese forensics tool, “MFSocket”, reported in 2019 and attributed to publicly traded cybersecurity company, Meiya Pico.
- The forensics tool works in tandem with
I am truly honored to join the Advisory Board of MindShield. This marks the beginning of an important journey—one focused on deciphering the underlying cognitive vulnerabilities that malicious cyber threats exploit. Our goal is to help individuals a
In my days there, Gartner had Maverick research (here is mine, from 2015 about social engineering AIs…. yes, really!) that “deliberately exposed unconventional thinking and may not agree with Gartner’s official positions.”
Here is a “maverick-ish” bl
On Sunday, July 20, Microsoft Corp. issued an emergency security update for a vulnerability in SharePoint Server that is actively being exploited to compromise vulnerable organizations. The patch comes amid reports that malicious hackers have used th
Seems like an old system system that predates any care about security:
The flaw has to do with the protocol used in a train system known as the End-of-Train and Head-of-Train. A Flashing Rear End Device (FRED), also known as an End-of-Train (EOT) de
We are excited to invite you to the CISO Cocktail Reception if you are there at the BlackHat USA, Las Vegas 2025. This event is organized by EC-Council with CISOPlatform and FireCompass as proud community partners.
Please note that this event is exc
It started in a rugby box.
There I was, watching the match from a VIP suite—surrounded by a handful of other cybersecurity leaders. The beers were cold, the banter flowing, but one comment cut through the noise:
“Cybersecurity’s no longer about tech
CISOPlatform Breach Intelligence July 27, 2025 – Major Insurance & Dating App Breaches
Report Date: July 27, 2025 Coverage Period: July 26, 2025 Classification: Executive Intelligence BriefExecutive Summary
July 26, 2025 witnessed significant cybersecu
CISOPlatform Breach Intelligence July 26, 2025 – Critical SharePoint Zero-Day, VMware Espionage Campaign, Mitel Authentication Bypass
Executive Summary
The cybersecurity threat landscape on July 25, 2025 revealed 4 significant security incidents across
CISOPlatform Breach Intelligence July 25, 2025 – SharePoint Zero-Day Exploitation & Aviation BEC Attacks
Report Date: July 25, 2025
Coverage Period: July 24, 2025
Classification: Confidential - Executive Distribution
Executive Summary
July 24, 2025 wit
As healthcare will become increasingly digitized, the upward push of connected clinical devices—normally called the Internet of Medical Things (IoMT)—is revolutionizing patient care. From wearable glucose monitors and pacemakers to smart infusion pum
I am honored to be selected as the Thinkers360 Ambassador for Cybersecurity!
Congratulations to all the annual selectees, representing their fields of expertise!
Special call-out to my longtime colleagues:
Chuck Brooks – Security
Ingrid Vasiliu-Feltes –
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
