Second critical category. Default passwords for access to the application
For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaw
from (4)
[Posted on Behalf of Sam Jones Cyber-Man | Helping SMEs get 98% more secure]
Hackers know you're at home and they know your network is vulnerable...
With the UK Government putting pressure on businesses to promote social distancing to avoid the spre
1. Take all the precaution to keep the Coronavirus away on the
Email Scams – Phishing / Spear phishing
· Unprotected Internet Connections – Employees when working from anywhere, they can connect to any unsecured Wi-Fi which can easily make easy way for hackers to compromise the data
· Absence of Organizational Sec
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
The Insider Risk Summit (West)
- Description:
- Created by: pritha
- Tags: insider risk summit, monterey, california
CISO Cocktail Reception, San Francisco
- Description:
Are you @RSAC?
CISO Yacht Cocktail Dinner
Going to RSA Conference?
After a day of attending sessions at RSA, join us on a luxury yacht for drinks, food, and live entertainment while enjoying the stunning skyline views, cruising on San Francisco Bay.
Yacht Party…
- Created by: pritha
- Tags: san francisco, rsac, rsac2026, ciso, cocktail, yacht, invite-only
