The cybersecurity field is dynamic and the roles and responsibilities are ever changing. People coming into the cybersecurity field often expect clearly defined positions and are surprised at the significant variance when looking at job descriptions
The cybersecurity field is dynamic and the roles and responsibilities are ever changing. People coming into the cybersecurity field often expect clearly defined positions and are surprised at the significant variance when looking at job descriptions
Intangibles now account for 90% of the S&P’s total assets and it is no accident that the core of cybersecurity has evolved to protect those aspects of the business. It is a natural progression for security to align with protecting the most important
In the aftermath of WhatsApp’s privacy notification to users, that they will again be sharing data with Facebook, there is still a lack of clarity. I see a lot of statements from WhatsApp and general chatter regarding what data they will NOT be shar
The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware
Happy Privacy Day! Now go check to see if EMOTET botnet has stolen your email and password.
Europol and a team of global law enforcement have successfully taken down part of the EMOTET botnet infrastructure and seized private data harvested by the c
Researchers ranked 96 countries by their collection and use of biometric data. Biometrics are gathered and stored as part of international travel, banking, law enforcement, healthcare tracking, and general surveillance by governments.
The worst offen
I get frustrated by shortsighted perceptions, which are misleading and dangerous is far easier to vilify something people don't fully understand.
Here is another article, titled Bitcoin is Aiding the Ransomware Industry, published by Coindesk, implyin
The recent attempt by malicious hackers to poison a Florida city water supply, highlights the public risks and exposure of critical infrastructures. Luckily, this incident was detected by an observant technician and mitigated before people were hurt
It appears France is the main victim for this recent attack which has several uncanny similarities to the SolarWinds exploitation that exposed thousands of U.S. government agencies, critical infrastructure organizations, and major businesses. Let me
I am looking forward to participating in the technology panel at the upcoming SecurityNext conference (Feb 24-25, virtual). Artificial Intelligence is accelerating and will play a growing role in security services and emerging capabilities. I expec
Today I am honored to join the World Smart Cities Economic Development Commission Advisory Board of the World Business Angels Investment Forum (WBAF), a partner of the G20 Global Partnership for Financial Inclusion (GPFI), to support job growth, digi
A free-flowing discussion about the past and future evolution of cybersecurity leadership. I had a great time sharing my personal experiences, industry insights, and a few rants in this podcast interview with Marco Ciappelli and Sean Martin of ITSP
My recent interview with Mark Byrne, from Cybx Security, covered a great range of cybersecurity questions, including new threats and solutions, Artificial Intelligence, DevSecOps, cybercrime, security impacts of Coronavirus, and the future of cybers
CISOPlatform is hosting Breakfast meetup @ San Francisco. Join us if you are interested.
Register Here : https://www.cisoplatform.com/profiles/blogs/meet-ciso-platform-at-rsa-conference-2024
CISOPlatform Summit: Stronger Together As A Community.
Join us on 30th May, Thursday, Shangri-La at Bangalore
Register Here : https://events.cisoplatform.com/cisoplatform-summit-2024
(Train Your Team) Trainings From Past Blackhat/Defcon/Nullcon Trainers
Register Here : https://event.cisoplatform.com/sacon/