Dear Friends & Colleagues, October is Cybersecurity Awareness Month. Actually, cybersecurity awareness really needs to be every month! Below is some content for the quest. Also, happy to announce that my book "Inside Cyber" will be arriving at bookst
Blog (976)
Cybersecurity expert Chuck Brooks discusses the top five issues in threat detection and how organizations can reduce the risk of cyber-attacks in 2024.
https://search.app/Miwuwt4EtELyDj9F8
Interview by Brian Kelly
I recently sat down with Ch
Protecting the frontier of space systems is unquestionably a security priority for governments and industry. Due to our increasing reliance on space, and particularly satellites, for communications, security, intelligence, and business, satellite and
In today's highly competitive digital landscape, user experience (UX) is more than just a buzzword—it's a pivotal factor in determining the success of your digital products. Whether you're building a website, an app, or a complex digital system, a se
Cybercriminals all over the world have leveraged this technology’s increased anonymity to buy and sell illegal goods, services, stolen data, underground infrastructure and force victims to pay ransom. While blockchain analysis enables researchers and
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing technology has a dark side as malicious attackers may misuse
You can buy ransomware for as little as $66, or hire a threat actor for $250. And if you look hard enough, you can even get a phishing kit for free on underground forums. Although these illicit methods may not be expensive, the damage they inflict ca
Basic structure of legal argument
- If conditions A, B and C are satisfied, then legal consequences X, Y and Z follow. (Major premise: legal rule)
- Conditions A, B and C are satisfied (or not). (Minor Premise: the facts of the case)
- Therefore, legal co
1. Art 21 of the Constitution guarantees fundamental right to life and personal liberty. This article of Constitution has been interpreted by the Judiciary with widest amplitude so as to include several other rights such as right to food and shelter,
Learn Modern SOC and D&R practices for free from Google! Yes, really! That’s the message. Join *hundreds* of others who already signed up!
Now, with full details….
After some ungodly amount of work, the original ASO crew (but really Iman!) put toget
Do I go to my Cloud Service Provider (CSP) for cloud security tooling or to a third party vendor?
Who will secure my cloud use, a CSP or a focused specialty vendor?
Who is my primary cloud security tools provider?
This question asked in many ways ha
So some of you are thinking “ewwww … another security transformation paper” and this is understandable. A lot of people (and now … a lot of robots too) have written vague, hand-wavy “leadership” papers on how to transform security, include security i
One more idea that has been bugging me for years is an idea of “detection as code.” Why is it bugging me and why should anybody else care?
First, is “detection as code” just a glamorous term for what you did when you loaded your Snort rules in cvs in
We all know David Bianco Pyramid of Pain, a classic from 2013. The focus of this famous visual is on indicators that you “latch onto” in your detection activities. This post will reveal a related mystery connected to SIEM detection evolution and its
We had a community session on Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype" featuring Hilal Ahmad Lone, CISO at Razorpay & Manoj Kuruvanthody, CISO & DPO at Tredence Inc.
In this discussion, we covered key aspects
I was recently asked “What do intelligence reports do? They appear worthless!”
I found the question both funny and ironic. Unfortunately, I had to gently deliver some uncomfortable news.
There is a fundamental difference between intelligence and the ab
Congrats to the Top 50 Global Thought Leaders and Influencers on Risk Management 2024!
Thanks Thinkers360 for the recognition to myself and so many of the hard working colleagues in the cybersecurity industry!
See the full list of profiles here: https
Many organizations are looking for trusted advisors, and this applies to our beloved domain of cyber/information security. If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams.
Untrusted Advisor
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
