In the presentation, the focus is on the transformative impact of artificial intelligence (AI) in cybersecurity, particularly in the context of malware generation and adversarial attacks. AI promises to revolutionize the field by enabling scalable so
All Posts (2637)
Secure Access Service Edge (SASE) solutions are revolutionizing enterprise networks by integrating SD-WAN with comprehensive security services. Traditionally, enterprises managed multiple point solutions for network and security needs, leading to com
This is the replay of the live LinkedIn interview with Matthew Rosenquist (CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker) to discuss the Rise of Aggressive Nation State Capabilities. Hosted by A
In a recent panel hosted by CISO Platform, cybersecurity experts discussed the evolving landscape of cyber threats in 2024. The panel highlighted the escalating danger posed by AI-driven attacks, with malicious use of AI becoming increasingly prevale
Google wants to up-sell enterprise Gmail users for AI security enhancements, when in reality the feature is mitigating the advances that attackers are making through their own innovative use of AI, making their Social Engineering attacks more effecti
The presentation on Cyber Risk Quantification (CRQ) and insurance highlighted key strategies for integrating advanced analytics with risk management. Emphasizing the importance of actionable insights tied to financial impacts, the speakers outlined a
In today's digital age, the importance of safeguarding personal data has become increasingly paramount. The implementation of data protection laws, such as the Digital Personal Data Protection Act (DPDPA), represents a crucial step towards ensuring t
As competition rises in the development of software applications, the stability and the quality of developed applications are core factors. This process is supported by quality assurance (QA) companies that offer valuable testing services that ensure
Emerging attack techniques in 2024 have profoundly impacted the cybersecurity landscape. The shift to cloud environments has made cloud security a critical focus. Attackers often exploit misconfigured cloud resources and stolen credentials to gain in
In the evolving landscape of IT infrastructure, the concept of Identity Fabric emerges as a critical solution to the challenges posed by fragmented identity management across diverse platforms. Traditionally, the push for a singular integrated identi
There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and numerous issues arising. After many embarrassing i
YouTube has announced that it will facilitate requests to remove AI generated content that is created to look or sound like you.
It is a nice gesture on behalf of YouTube, but the process to protect from deepfakes is not scalable. The attackers will
The Cybersecurity Vault - episode 35, with guest Mikko Hypponen.
Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was a pivotal moment for nation state attacks. Mikko is close to the front lines and on
Simply put,penetration testing as a service or PTaaS is a continuous guard against cyber threats, offering an ongoing cycle of testing that traditional penetration tests don’t provide. This service combines the insights of security experts with the e
A program that involves several processes to run simultaneously without having to wait for completion of execution for previous ones is called Asynchronous programming. When data driven tasks are done sequentially then it might spoil the user experie
The Cybersecurity Vault - episode 34, with guest Chase Cunningham.
We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how they will maneuver to take advantage.
Chase’s LinkedIn
As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust security mindset and a security-first approach withi
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
- Created by: Biswajit Banerjee
Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)
- Description:
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…
- Created by: Biswajit Banerjee
- Tags: ciso, sandro bucchianeri, nab
