In this insightful video, industry experts explore the transformative impact of Zero Trust on cybersecurity, discussing its role in addressing modern security challenges. As cyber threats evolve and traditional perimeter defenses become outdated, Zer
All Posts (2677)
In an insightful panel discussion hosted by the CISO platform, experts converged to delve into the technical challenges and strategies associated with implementing the Digital Personal Data Protection (DPDP) Act. Moderated by Rajiv Nandwani, Global I
Selecting the right attack surface management vendor is essential for safeguarding sensitive data and securing your organization against vulnerabilities. Attack surface management involves identifying and mitigating risks across your digital footprin
In today's digital landscape, where cyber threats constantly evolve, security testing has become integral to the software development lifecycle (SDLC). Ensuring that your software is secure from the onset is not just a best practice; it's a necessity
The Gartner Hype Cycle 2024 shows how existing technologies have been integrated into broader platforms for more comprehensive exposure management.
Key changes in Gartner Hype Cycle 2024:
Exposure Assessment Platforms now include both :
- vulnerabil
Cyber Security has rapidly evolved by including AI-driven tools like Generative Pre-trained Transformers (GPTs). Here's an overview of the impactful cyber security GPTs that might be helpful for Chief Information Security Officers (CISOs) and their s
Here’s a capability matrix that organizations can refer to when evaluating potential attack surface management or external attack surface management or EASM vendors.
Capability Matrix for Evaluating EASM Vendors
This blog discusses essential questions that organizations should consider when evaluating potential EASM vendors, focusing on features, support, and integration capabilities.
External Attack Surface Management (EASM) is a critical component in ide
The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, such as academic papers. According to reports, OpenA
The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board members have a clear responsibility to protect the business and the inve
The Supreme Court struck down the Chevron Doctrine, sharply cutting back the power of federal agencies to interpret the laws they oversee and ruled that courts should rely on their own interpretation of ambiguous laws. The ramifications will have rip
California’s Department of Motor Vehicles will implement a blockchain to prevent vehicle title fraud. They will use Ava Labs’s Avalanche blockchain to allow over 39 million residents to claim and access their vehicle titles.
The online service is int
Tackling the biggest problems in cybersecurity requires superb insights and collaboration across the industry. This CISO Advisory Board will be a catalyst for constructive communication, practical innovation, and a showcase for leadership that drives
Held on 30th May, Thursday, at Shangri-La in Bangalore, the CISOPlatform Summit is known as Asia's largest IT security conference. This year's summit continued its tradition of fostering collaboration and helping the community make better security de
The Cybersecurity Vault - episode #36, with guest Ira Winkler
Today we are going to talk about the massive global IT outage, effecting over 8 million devices, caused by the cybersecurity vendor CrowdStrike. Although not a cyberattack, this incident i
In the rapidly evolving field of software development, integrating advanced AI models like ChatGPT can provide significant advantages in enhancing user experience, automating customer support, and facilitating various development tasks. However, as w
Details emerge on how a bad CrowdStrike update was allowed to land on Windows systems and cause over 8 billion computers to fail.
I discuss their leadership and break down the preliminary Post Incident Review document to reveal the point of failure fo
Fireside Chat On "The Future Of AI In Cybersecurity"
With Bruce Schneier (Cyptographer, author & security guru) and Bikash Barai (Co-founder, CISOPlatform & FireCompass)
>> Click Here To Read The Executive Summary.
![]() |
Featured Blogs To R
Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it to over 8 million devices and caused widespread global o
India's Data Protection Law namely The Digital Personal Data Protection Act or the DPDPA has been a topic of much discussion and debate in recent times. This Act aims to regulate the collection, storage, and processing of personal data in India, and
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
The Insider Risk Summit (West)
- Description:
- Created by: pritha
- Tags: insider risk summit, monterey, california

