I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design weakn
Featured Posts (243)
CISA has raised the alarm about, the recently discovered CVE-2024-5910 in Palo Alto Networks’ Expedition tool. This vulnerability is being actively exploited, leaving organizations scrambling to secure their systems before attackers take advantage.
B
As per the SEBI circular "SEBI/HO/ ITD-1/ITD_CSC_EXT/P/CIR/2024/113" dated 20 Aug 2024 it is mandatory for all MIIs and Qualified REs to be compliant to the below DE.DP.S4 CART guidelines.
SEBI’s CART Requirement (SEBI/HO/ ITD-1/ITD_CSC_EXT/P/CIR/202
The Gartner Hype Cycle 2024 shows how existing technologies have been integrated into broader platforms for more comprehensive exposure management.
Key changes in Gartner Hype Cycle 2024:
Exposure Assessment Platforms now include both :
- vulnerabil
The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, such as academic papers. According to reports, OpenA
Cyber Security has rapidly evolved by including AI-driven tools like Generative Pre-trained Transformers (GPTs). Here's an overview of the impactful cyber security GPTs that might be helpful for Chief Information Security Officers (CISOs) and their s
This blog discusses essential questions that organizations should consider when evaluating potential EASM vendors, focusing on features, support, and integration capabilities.
External Attack Surface Management (EASM) is a critical component in ide
On July 19, 2024, a CrowdStrike update caused a global IT outage, impacting millions of Windows devices. In this article on ‘crowdstrike microsoft outage and what we learned as CISOs,’ we explore the event’s specifics and discuss key lessons for IT l
Not sure who need this resource, but Microsoft updated its Recovery Tool for the CrowdStrike issue on Windows endpoints:
Here is the link to the Microsoft Tech Community Support Site:
https://techcommunity.microsoft.com/t5/intune-customer-success/new-r
CISA released 7 Industrial Control Systems (ICS) advisories in July, which provide timely information about current security vulnerabilities and exploits.
1> Johnson Controls Kantech Door Controllers
ICSA-24-184-01 Johnson Controls Kantech Door Contr
Last month, we were thrilled to have Bruce Schneier join us at the CISO Platform Summit 2024 in a fireside chat with Bikash Barai.
Bruce is one of the foremost cryptographers and a leading mind in cybersecurity. Often referred to as the "security guru
A program that involves several processes to run simultaneously without having to wait for completion of execution for previous ones is called Asynchronous programming. When data driven tasks are done sequentially then it might spoil the user experie
When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad.
TL:DR Researchers found a vulnerability in a cryptocurrency exchange. They notified the company, but then exploited the bug to
Reuven Cohen, who goes by the Twitter handle @ruv, has recently been experimenting with using GPT to power attack bots. He recently posted this on his Facebook page after being able to create such an attack bot very quickly:
“Autonomous AI Hack Bots
Artificial intelligence is the most powerful cutting edge technology that uses computer systems that are programmed with machine learning abilities, has capabilities of performing specific tasks that is beyond the capabilities of human mind. Human br
Index :
- Session brief
- Keypoints
- Watch Panel video (on-demand)
- Executive Summary
Session Brief :
In this panel, industry experts discuss the growing need for 'The challenge of CISO burnout'. CISO is an operation extensive role, it gets harder wi
Expert Panel | CISO Burnout Series | Part 2
Topic "CISO Burnout Tips: Addressing Through Organizational Culture and Cyber Maturity"
About CISO Platform
CISO Platform is the world's first online community solely dedicated for information senior se
In the landscape of ever-evolving cyber threats, how can organizations safeguard their digital assets with efficacy and speed? Continuous threat exposure management (CTEM) stands out as the proactive cybersecurity frontier. This real-time strategy tr
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Best of the World Talks on The CISO's Journey: From Expert to Leader
- Description:
We are hosting an exclusive "Best of the World" Talks session on "The CISO’s Journey: From Expert to Leader" featuring David B. Cross (SVP & CISO at Oracle), Bikash Barai (Co-founder of CISO Platform & FireCompass) & David Randleman (Field CISO at FireCompass).
The journey from cybersecurity expert to strategic leader is a transformative one for CISOs. This session delves into the stages of a CISO’s evolution, the balance…
- Created by: Biswajit Banerjee
- Tags: ciso