Blog (906)
As competition rises in the development of software applications, the stability and the quality of developed applications are core factors. This process is supported by quality assurance (QA) companies that offer valuable testing services that ensure
Emerging attack techniques in 2024 have profoundly impacted the cybersecurity landscape. The shift to cloud environments has made cloud security a critical focus. Attackers often exploit misconfigured cloud resources and stolen credentials to gain in
In the evolving landscape of IT infrastructure, the concept of Identity Fabric emerges as a critical solution to the challenges posed by fragmented identity management across diverse platforms. Traditionally, the push for a singular integrated identi
There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and numerous issues arising. After many embarrassing i
YouTube has announced that it will facilitate requests to remove AI generated content that is created to look or sound like you.
It is a nice gesture on behalf of YouTube, but the process to protect from deepfakes is not scalable. The attackers will
Simply put,penetration testing as a service or PTaaS is a continuous guard against cyber threats, offering an ongoing cycle of testing that traditional penetration tests don’t provide. This service combines the insights of security experts with the e
A program that involves several processes to run simultaneously without having to wait for completion of execution for previous ones is called Asynchronous programming. When data driven tasks are done sequentially then it might spoil the user experie
When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad.
TL:DR Researchers found a vulnerability in a cryptocurrency exchange. They notified the company, but then exploited the bug to
Artificial intelligence is the most powerful cutting edge technology that uses computer systems that are programmed with machine learning abilities, has capabilities of performing specific tasks that is beyond the capabilities of human mind. Human br
Reuven Cohen, who goes by the Twitter handle @ruv, has recently been experimenting with using GPT to power attack bots. He recently posted this on his Facebook page after being able to create such an attack bot very quickly:
“Autonomous AI Hack Bots
Operation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the reasons you may think.
The multi-national law enforcement effort, led by EUROPOL, seized over 100 servers and 2 thousand domains that hos
The discussion explores the potential impact of cybersecurity incidents, such as the SolarWinds case, on the insurance industry. There's speculation about whether insurers will adapt their offerings to accommodate the demand for specialized coverage,
The discussion revolves around the responsibilities of CISOs and other senior officers regarding cybersecurity disclosures, the potential transition of accountability, and the feasibility of negotiated contract clauses for cybersecurity protections.
The discussion addresses the shifting responsibilities within organizations regarding cybersecurity disclosures, particularly in the context of CISOs and their relationship with other senior officers. It explores the possibility of transitioning acco
The discussion centers on the inadequacies of identity access management (IAM) practices in software development within a cloud-first model across various enterprises. It highlights the necessity of incorporating security measures early in the softwa
The conversation delves into the complexities of cybersecurity management, including the responsibilities of CISOs, the implications of security breaches, and potential changes in insurance coverage. It explores the challenges faced by CISOs in nego
The discussion explores the complex dynamics between regulatory actions, cybersecurity practices, and the responsibilities of CISOs. It delves into the consequences of regulatory overreach on the industry and contrasts differing viewpoints on the rol
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
- Created by: Biswajit Banerjee
Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)
- Description:
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…
- Created by: Biswajit Banerjee
- Tags: ciso, sandro bucchianeri, nab
