CISO (287)

We had an amazing CISOPlatform Playbook Roundtable in Atlanta! The energy in the room was incredible, and we’re taking it forward by launching a Cybersecurity Chapter in Atlanta to create the standards for pen testing programs. (Join CISOPlatform Atl

Read more…

In an age where AI-driven agents increasingly handle sensitive requests, the critical question is: how do we trust the identity behind every interaction? Traditional methods like passwords and OTPs are proving inadequate in stopping fraud, deepfakes,

Read more…

In today’s cybersecurity landscape, where analysts are overwhelmed by data and threats evolve faster than manual processes can handle, task-driven AI agents are emerging as game-changers. This AI Demo Talk featured Steve Povolny (Senior Director, Sec

Read more…

In today’s rapidly evolving threat landscape, human risk remains one of the most critical challenges for CISOs. While technology defenses are essential, employee behaviors often define the difference between a contained incident and a costly breach.

Read more…

We’re excited to bring you an insightful AI Demo Talk on "Building Trust in AI-Driven Interactions: Securing Agentic AI with Trusted Identity and Privacy-First Biometrics" with Nadav Stern (Head of Engineering, Anonybit) & Jeremiah Mason (Chief Produ

Read more…

We’re excited to bring you an insightful AI Demo Talk on "Task driven agents for investigation, response, analysis and more!" with Steve Povolny (Senior Director, Security Research & Competitive Intelligence, Exabeam).

In this session, we’ll take a d

Read more…

Palo Alto, Calif., July 29, 2025, CyberNewswire — Despite the expanding use of browser extensions, the majority of enterprises and individuals still rely on labels such as “Verified” and “Chrome Featured” provided by extension stores as a security in

Read more…

Google’s vulnerability finding team is again pushing the envelope of responsible disclosure:

Google’s Project Zero team will retain its existing 90+30 policy regarding vulnerability disclosures, in which it provides vendors with 90 days before full

Read more…

Security teams can no longer afford to wait for alerts — not when cyberattacks unfold in milliseconds.

That’s the core warning from Fortinet’s Derek Manky in a new Last Watchdog Strategic Reel recorded at RSAC 2025. As adversaries adopt AI-driven to

Read more…

Newark, NJ, Aug. 4, 2025, CyberNewswire—Early Bird registration is now available for the inaugural OpenSSL Conferencescheduled for October 7–9, 2025, in Prague. The event will bring together leading voices in cryptography, secure systems, and open-

Read more…

An Arizona woman was sentenced to eight-and-a-half years in prison for her role helping North Korean workers infiltrate US companies by pretending to be US workers.

From an article:

According to court documents, Chapman hosted the North Korean IT wo

Read more…

London, Aug. 11, 2025, CyberNewswire—A survey of 80 North American MSPs shows fragmented security stacks drive fatigue, missed threats, and business inefficiency

13695658882?profile=RESIZE_400x

Security tools meant to protect managed service providers are instead overwhelming them

Read more…

“Who’s winning on the internet, the attackers or the defenders?”

I’m asked this all the time, and I can only ever give a qualitative hand-wavy answer. But Jason Healey and Tarang Jain’s latest Lawfare piece has amassed data.

The essay provides the fi

Read more…

We’re excited to bring you an AI Demo Talk on "Harnessing AI to Personalize and Automate Human Risk Management" with Uzair Ahmed Gilani (CTO, Right-Hand Cybersecurity). In this session, we’ll dive into how AI can transform the way organizations manag

Read more…

LAS VEGAS — A decade ago, the rise of public cloud brought with it a familiar pattern: runaway innovation on one side, and on the other, a scramble to retrofit security practices not built for the new terrain.

Related: GenAI workflow risks

Shadow IT

Read more…

I spoke at the Black Hat Conference in Las Vegas for the first time since the COVID-19 pandemic. Here’s what I learned and a few takeaways to share.

 

13687143501?profile=RESIZE_180x180

 

I just returned from Black Hat in Las Vegas, and once again, AI dominated all conversations on b

Read more…

Airportr is a service that allows passengers to have their luggage picked up, checked, and delivered to their destinations. As you might expect, it’s used by wealthy or important people. So if the company’s website is insecure, you’d be able to spy o

Read more…

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership