The RSAC conference has once again descended upon San Francisco and delivered an event that brings together the largest collection of industry leaders, technologies, and cybersecurity community events!
Over the course of several days, attendees acces
technology (175)
Does this process flow look familiar? It is the compounding failure due to an absence of cybersecurity fundamentals.
When innovation plows forward without the benefit of cybersecurity, there will eventually be tears, finger pointing, denial, and loss.
Great conferences not only bring together innovation, expert views, but it is an opportunity to meet amazing leaders, innovators, and rising stars who will drive our industry forward.
The InCyber Forum in Montreal, was an outstanding event and a show
A new report from MIT Sloan cybersecurity research reveals that AI is leveraged in 80% of ransomware attacks. Of the 2811 ransomware cases investigated, adversaries used AI 80.8% of the time in their attacks. Organized threat agents like LockBit, R
Explore the disconnect between technology design and human nature with Sumona's insights. Discover why systems should adapt to human patterns for better usability.
Watch the full Cybersecurity Vault podcast: https://www.youtube.com/watch?v=XxO_Iftt0d
I am honored to be selected as the Thinkers360 Ambassador for Cybersecurity!
Congratulations to all the annual selectees, representing their fields of expertise!
Special call-out to my longtime colleagues:
Chuck Brooks – Security
Ingrid Vasiliu-Feltes –
I have an issue with this! No disrespect to the original poster creator, who is the sheer levels of complexity and advocating the need for multiple tools to work together, but cybersecurity will continue to disappoint, be ever more expensive, and ove
The cybersecurity industry moves fast! The attackers are constantly adapting and relentless in their pursuits that victimize others. New users are being added to the global online ecosystem. Services are hungry for data, which is rising in total valu
Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware proof-of-concept that infects at the hardware layer, in
There are many cybersecurity and privacy risks to consider, both from the user and the enterprise, when it comes to Microsoft's new OneDrive feature that will connect their personal OneDrive with their work device!
LinkedIn: https://www.linkedin.com/
Join me on Thursday May 1st, 11am PT as a guest with Defendify on a live webinar where I’ll discuss practical cybersecurity leadership for IT teams!
Communicating cyber risk in business terms to secure support and resources
Importance of planning and p
The Cybersecurity Vault — episode 44, with guest Rinki Sethi.
2025 will be an interesting year for the cybersecurity industry! Cybersecurity Insights interviews experts for their take on the most relevant changes. Rinki Sethi discusses how attackers a
For over a decade, we warned the healthcare industry this was coming. They ignored us. Their sole focus was HIPAA compliance — checking regulatory boxes rather than securing critical systems. We told them that system and service availability attacks
My deepest appreciation to all the incredible cybersecurity luminaries who joined The Cybersecurity Vault podcast last year! Your insights, expertise, and thought-provoking discussions made each episode invaluable for the audience and myself. I appre
Mentorship is crucial in cybersecurity. I am honored to be listed on TopMate’s Top 50 Cybersecurity Mentors in the US list! Leveraging the knowledge, experience, and connections of those who have a deep understanding and are respected among their pee
The Cybersecurity Vault - episode 41, with guest Dan Lohrmann.
2025 will be an interesting year for the cybersecurity industry! Dan Lohrmann provides his insights to the challenges and opportunities the cybersecurity industry will face in 2025!
In this
The Cybersecurity Vault — episode 40, with guest Sumona Banerji
Attackers are masterful at using Social Engineering techniques to victimize others. They take advantage of vulnerabilities that are deeply rooted in our mental and emotional foundations.
I am deeply honored and thrilled to be recognized this year by Clutch as part of an elite community of technology leaders and influencers.
This is an incredible list of influencers who have attracted the attention of business professionals with their
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
