On July 19, 2024, a CrowdStrike update caused a global IT outage, impacting millions of Windows devices. In this article on ‘crowdstrike microsoft outage and what we learned as CISOs,’ we explore the event’s specifics and discuss key lessons for IT l
All Posts (2200)
Not sure who need this resource, but Microsoft updated its Recovery Tool for the CrowdStrike issue on Windows endpoints:
Here is the link to the Microsoft Tech Community Support Site:
https://techcommunity.microsoft.com/t5/intune-customer-success/new-r
The recent CrowdStrike outage, that continues to have global implications, reinforces the fact that cybersecurity solutions help manage cyber attack risks, but can also be a source of risk. The level of system access, which is necessary to provide se
|
In today's digital age, social media platforms play a significant role in shaping opinions, influencing purchasing decisions, and connecting brands with their target audience. Among these platforms, Instagram stands out as a powerful tool for marketi
The panel discussion delved into the critical aspects of AI adoption within enterprises, emphasizing key trends that CISOs should prioritize. The conversation highlighted several pivotal areas. First and foremost, readiness emerged as a fundamental r
As an AT&T customer, I did receive the unwelcome news that they suffered a data breach.
Here is a rundown for what you should to know.
BREACH DETAILS
· This is a sizable data breach of about 109 million customers
· Call and text interactions from May 1,
CISA released 7 Industrial Control Systems (ICS) advisories in July, which provide timely information about current security vulnerabilities and exploits.
1> Johnson Controls Kantech Door Controllers
ICSA-24-184-01 Johnson Controls Kantech Door Contr
Banks face multiple guidelines from various authorities on cybersecurity incident reporting. Consistent, documented procedures (SOPs) are essential for effective response, regardless of timing or personnel involved.
Action Plan:
- Understand the Line of
In today's rapidly evolving technological landscape, Artificial Neural Networks (ANNs) have emerged as a cornerstone of artificial intelligence, revolutionizing various fields including cybersecurity. Inspired by the intricacies of the human brain, A
Generative AI, particularly through the lens of large language models (LLMs), represents a transformative leap in artificial intelligence. With advancements that have fundamentally altered our approach to AI, understanding and leveraging these techno
In today's digital age, ensuring children's safety online has become more crucial than ever. At the forefront of this effort is the Kid Security Forum, dedicated to raising awareness about cybersecurity risks among schoolchildren nationwide. Through
Implementing Governance, Risk, and Compliance (GRC) frameworks is widely acknowledged yet challenging in practice. Despite a broad understanding of GRC principles, organizations often struggle to align top management, existing staff, and newcomers ef
In today's dynamic business environment, incident response has become increasingly critical across various sectors, from physical emergencies like riots and wars to IT-related issues such as cybersecurity breaches and network disruptions. Swift and e
In this comprehensive overview of Cisco's latest innovations in cybersecurity, the focus is squarely on resilience and adaptation in the face of evolving threats. The discussion covers the imperative of tackling Mal information, the increasing sophis
The CISO Platform, celebrating its 15th year, began with a vision to unite cybersecurity leaders beyond mere networking to create tangible community goods. Originating from a Defcon experience where hackers collaborated openly, the platform aimed to
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)