Blog (976)
The CISO Platform Summit welcomes attendees to a decade-long journey of collaboration and knowledge-sharing among senior security executives, fostering a safer online world. Omri Sejkov, CEO of Profero, presents a captivating session on Iranian cybe
The landscape of cybersecurity has undergone significant transformations over the years, reflecting the ever-changing tactics of cybercriminals and the evolving vulnerabilities in digital infrastructure. This blog explores the shifting trends i
Multiple U.S. government agencies have cautioned that the Black Basta ransomware group is actively targeting the healthcare sector along with 12 out of 16 critical infrastructure segments.
The FBI, CISA, and HHS issued an advisory on a Friday, re

In today's rapidly evolving cybersecurity landscape, external attack surface management (EASM) has emerged as a critical strategy for organizations to safeguard their digital assets. This blog explores the significance of EASM, its key componen

In the ever-evolving landscape of cybersecurity, organizations are increasingly recognizing the importance of external attack surface management (EASM) in bolstering their defenses against cyber threats. This blog delves into the evolution of
As the cybersecurity landscape evolves, organizations face increasing threats and challenges, particularly in the era of remote work and digital transformation. In response to these challenges, Continuous External Attack Surface Management (EAS

In today's rapidly evolving cybersecurity landscape, organizations face unprecedented challenges, particularly in the wake of the "new normal" brought about by global events. Remote work, cloud adoption, and digital transformation have expanded

Welcome to an enlightening panel discussion on External Attack Surface Management (EASM), an essential component of modern cybersecurity. Today, we gather insights from esteemed cybersecurity leaders to explore the significance of EASM, its com

Welcome to an insightful discussion on External Attack Surface Management (EASM) brought to you by the SISO Platform. In today's dynamic cybersecurity landscape, understanding and managing external attack surfaces are paramount for organization

In today's rapidly evolving cybersecurity landscape, organizations face constant challenges in managing their external attack surface and mitigating potential risks. One approach gaining prominence is External Attack Surface Management (EASM),
In this insightful discussion, two cybersecurity professionals, Matthew and his colleague, delve into the intricacies of understanding organizational dynamics and navigating challenges within the cybersecurity landscape. The conversation touches u
In the ever-evolving landscape of cybersecurity, organizations are constantly seeking effective solutions to manage their external attack surface and mitigate risks. One approach gaining traction is the utilization of open-source tools for reco

In today's dynamic cybersecurity landscape, traditional security measures are no longer sufficient to combat evolving threats. As organizations strive to fortify their defenses, they must adopt new tools, techniques, and procedures (TTPs) to st
In this insightful discussion, a new Chief Information Security Officer (CISO) shares their top priorities for the first month on the job. Emphasizing the importance of building relationships, understanding the business strategy, and assessing

In today's ever-evolving cybersecurity landscape, organizations face an array of threats that require proactive and robust defense mechanisms. External Attack Surface Management (EASM) emerges as a critical component in fortifying organizational
In the intricate realm of cybersecurity, vigilance is paramount. As the digital landscape continues to evolve, organizations face a myriad of threats, from network vulnerabilities to sophisticated zero-day attacks. In this blog, we delve into th
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)







