We had a community fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operations Specialist, BJC Healthcare) & Erik Laird (Vice President - North America, FireCompass), where we delv
Blog (682)
Cybersecurity professionals have long relied on vulnerability databases and CWE lists, but NIST's Bugs Framework (BF) brings a refreshing formalism and extensibility to the field. Developed by Irena Bojanova and detailed in NIST Special Publication 8
Modern cyber defenses increasingly need to be identity-centric. Many industry thought leaders have honed in on this giving rise to the often heard “identity is the new perimeter”. Consequently, attackers do indeed now find it easier to log in rather
Privacy risks and demands will continue to rise in our AI powered world, as AI systems hunger for access to data and create content that may undermine privacy principles!
Privacy leaders have a tough job ahead - balancing the need for more intellig
I am very glad that the Common Vulnerabilities and Exposures (CVE) program was re-funded by the US Government, specifically CISA (Cybersecurity and Infrastructure Security Agency), but this last-minute catch has raised serious concerns with the recen
The power of signals, or indicators, is evident to those who understand them. They are the basis for identity risk intelligence and it’s role in disinformation security. For years, cybersecurity teams have anchored their defenses on Indicators of Com
Welcome to the March edition of CISO Platform Highlights – your quick snapshot of the most insightful content, expert conversations, and community updates from the world of cybersecurity leadership.
This month, we explored one of the industry's most
In the ever-evolving world of healthcare, prior authorization remains one of the most time-consuming and error-prone administrative processes. Before certain medications, procedures, or treatments can be administered, healthcare providers must obtain
In today’s hyper-connected world, businesses face an ever-growing range of cyber threats. From ransomware attacks to data breaches, the need for robust cybersecurity infrastructure is more critical than ever. Choosing the right information security p
We’re excited to bring you an insightful fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operation Specialist, BJC Healthcare | Incident Response Analyst | Ethical Hacker | Dark W
“Flickering screens, a sickly, yellow glow. Humming servers, a constant, low thrum of digital malaise. Alerts screamed into the void, a cacophony of meaningless noise, lost in the echoing expanse of our digital tomb. Playbooks, relics of a forgotten
Icarus, in Greek mythology, son of the inventor Daedalus who perished by flying too near the Sun with waxen wings.
BALANCE
Throughout my career, I’ve had the opportunity to help many organizations out with operational, tactical, and strategic s
“COBIT is not about security!”
I have heard this statement being said a couple of times about COBIT and for a bunch of different certificates and certifications throughout my career. There is of course truth in this statement as COBIT is not explic
Threat hunting is more than a buzzword. It’s a discipline. A practice. A continuous pursuit of anomalies that might just be lurking beneath the surface. When we talk about Threat Hunting 360, we mean looking at threats from every possible angle. No a
The Basics Never Change
Cybersecurity trends come and go. New threats emerge. Fancy tools promise magic solutions. But ask any seasoned threat hunter, and they’ll tell you—the fundamentals are what keep organizations safe. The problem? Too many peopl
Exploring Cybersecurity's Stressful Side
Hey there, cyber defenders! Ever feel like you're in a never-ending game of whack-a-mole? You're not alone. Let's take a moment to talk about something super important: mental health in the world of informatio
Businesses of all sizes, whether in the financial, transportation, retail, communications, entertainment, healthcare, or energy sectors, are impacted by cybersecurity. Cyberthreats are commonplace. Cyberattacks have increased in frequency and malicio
PAYMENT PAGE SECURITY; Navigating PCI DSS v4.0: Insights on Requirements 6.4.3 and 11.6.1
Interview with Ed Leavens, Founder and CEO of DataStealth
As the March 31, 2025 deadline for PCI DSS (Payment Card Industry Data Security Standard) v4.0complian
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta
- Description:
Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !
CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…
- Created by: Biswajit Banerjee