Software delivery is getting faster every year. Teams want to release apps quickly and often. But fast releases must also be reliable. That’s why testing is so important. Testing ensures your app works before reaching users. DevOps makes this fast de
Blog (976)
Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware proof-of-concept that infects at the hardware layer, in
Welcome to the April edition of CISO Platform Highlights – your quick snapshot of the most insightful content, expert conversations, and community updates from the world of cybersecurity leadership.
This month, we delved into the often-hidden journey
One of my friends, Greg van der Gaast tells this great story that perfectly illustrates one of the biggest challenges we face in cybersecurity today. It goes something like this…
“Imagine someone who loves coffee. They have a fantastic coffee shop j
Imagine building a house on sand or precariously stacking blocks in a game of Jenga. No matter how carefully you place the materials or how advanced the tools you use, the structure is doomed to collapse without a strong, stable foundation.
This is t
Key Cybersecurity Challenges In 2025—Trends and Observations
by Chuck Brooks
In 2025, cybersecurity is gaining significant momentum. However, there are still many challenges to address. The ecosystem remains unstable in spite of investme
Cyber Crime: Stages of Trial in Court
Agentic Artificial Intelligence (AI) (What Is Agentic AI?) is becoming a powerful force in cybersecurity and modern warfare. These AI systems consist of autonomous agents with minimal human oversight. They perceive, decide, and act independently to a
The PowerSchool data breach nightmare of 2024 doesn’t end. Here is a quick rundown to catch up, before I call out some key learnings:
In December 2024, PowerSchool was breached by ransomware attackers who claimed to have copied 62 million records, a f
Misuse of the newly announced Microsoft OneDrive synchronization feature puts corporate security and personal privacy at serious risk in ways not likely understood by the users. Microsoft wants people to connect their personal OneDrive file share wit
Recovering from a cyber attack can be costly
Cyber insurance is one option that can help protect your business against losses resulting from a cyber attack. If you’re thinking about cyber insurance, discuss with your insurance agent what policy would
Many don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power outage.
Critical Infrastructures are a favorite of aggressive Nation State cyber threats. In addition to communi
MIT - AI Risk Repository (April 2025 Update)
This month, 9 new documents have been added to their AI Governance Repository. Published between 2024–2025, these include a mix of government reports, industry papers, and preprints covering:
a)Generative
CIS guide on "The Cost of Cyber Defense: Implementation Group 1 (IG1)," designed to address key questions, including:
- What initial protections should you prioritize?
- What tools are necessary for deploying these protections?
- What will the implementat
Nations are investing heavily in offensive cyber capabilities. The proposed 2026 US defense budget earmarks an additional $1 billion in funding for offensive cyber operations, specifically to the US Indo-Pacific Command (USINDOPACOM). In 2025, the De
The digital realm has permeated every facet of modern life, leaving an indelible mark on the legal landscape. Electronic evidence, encompassing emails, messages, social media posts, and digital documents, has become a cornerstone in legal proceedings
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
