All Posts (2678)
If you are unable to see a form embedded below, please use this link to fill the survey : Click To Go To Survey Form
Software delivery is getting faster every year. Teams want to release apps quickly and often. But fast releases must also be reliable. That’s why testing is so important. Testing ensures your app works before reaching users. DevOps makes this fast de
This is how you handle cybercrime digital extortion! Coinbase was compromised by trusted 3rd party partners, which exposed customer data — but customer keys to their assets were still safe. The cyber criminals then attempted to extort $20 million fro
Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware proof-of-concept that infects at the hardware layer, in
Welcome to the April edition of CISO Platform Highlights – your quick snapshot of the most insightful content, expert conversations, and community updates from the world of cybersecurity leadership.
This month, we delved into the often-hidden journey
One of my friends, Greg van der Gaast tells this great story that perfectly illustrates one of the biggest challenges we face in cybersecurity today. It goes something like this…
“Imagine someone who loves coffee. They have a fantastic coffee shop j
Imagine building a house on sand or precariously stacking blocks in a game of Jenga. No matter how carefully you place the materials or how advanced the tools you use, the structure is doomed to collapse without a strong, stable foundation.
This is t
Key Cybersecurity Challenges In 2025—Trends and Observations
by Chuck Brooks
In 2025, cybersecurity is gaining significant momentum. However, there are still many challenges to address. The ecosystem remains unstable in spite of investme
Cyber Crime: Stages of Trial in Court
There are many cybersecurity and privacy risks to consider, both from the user and the enterprise, when it comes to Microsoft's new OneDrive feature that will connect their personal OneDrive with their work device!
LinkedIn: https://www.linkedin.com/
Agentic Artificial Intelligence (AI) (What Is Agentic AI?) is becoming a powerful force in cybersecurity and modern warfare. These AI systems consist of autonomous agents with minimal human oversight. They perceive, decide, and act independently to a
The PowerSchool data breach nightmare of 2024 doesn’t end. Here is a quick rundown to catch up, before I call out some key learnings:
In December 2024, PowerSchool was breached by ransomware attackers who claimed to have copied 62 million records, a f
Misuse of the newly announced Microsoft OneDrive synchronization feature puts corporate security and personal privacy at serious risk in ways not likely understood by the users. Microsoft wants people to connect their personal OneDrive file share wit
Recovering from a cyber attack can be costly
Cyber insurance is one option that can help protect your business against losses resulting from a cyber attack. If you’re thinking about cyber insurance, discuss with your insurance agent what policy would
Many don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power outage.
Critical Infrastructures are a favorite of aggressive Nation State cyber threats. In addition to communi
MIT - AI Risk Repository (April 2025 Update)
This month, 9 new documents have been added to their AI Governance Repository. Published between 2024–2025, these include a mix of government reports, industry papers, and preprints covering:
a)Generative
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
The Insider Risk Summit (West)
- Description:
- Created by: pritha
- Tags: insider risk summit, monterey, california
