CISO Contributors
- Igors Konovalovs, Director Global Solution Specialist, Mandiant
- Bikash Barai, Co-founder CISO Platform; FireCompass
- Pradipta Kumar Patro, GM, Adani Group
- Mohd Imran, Group - Head Information Security, L&T Financial Services
- Manoj K
CISO Contributors
A new tool is gaining popularity on the dark web which provides insights to users if their cryptocurrency activity might be flagged by authorities as potentially illicit. Such a tool can provide cybercriminals the intelligence necessary to stay under
Gartner Hype Cycle is the most important analyst document which helps to find out the key trends in our Industry. The acceleration in digital transformation has brought about new threats. In the 2021 Hype Cycle for Security Operations, Gartner analyz
Supply chain attacks have become a growing trend in the security world. Attackers are exploiting the trust users have in acclaimed software companies to implant malware into systems. It often results in mass-scale outreach attacks and goes undetected
There are 600 Million Differences Between Hackers and Cybercriminals…
An amazing story is emerging from a massive cryptocurrency exploitation that exemplifies the difference between a ‘hacker’ and a ‘cybercriminal’.
Interested in more cybersecurity i
Key Takeaways (Summary by Anton Chuvakin):
I wanted to personally invite you to join us today with Ryan Benson (Ex-Gartner Analyst) and Bikash Barai (Co-founder, FireCompass & CISO Platform). They will be discussing the "New Trends From Gartner Hype Cycle, 2021 That A CISO Must Know". Date
This Google talk helps us understand which are the main areas to look first in and create a process to prevent account compromise. Once compromised, it is much harder to stop access.
About Speaker
Elie Bursztein leads the anti-abuse research team a
Over The Last 12-18 Months, the way we run our business and manage our teams has Changed. Our data, applications, users are everywhere. We are more reliant on The Cloud than ever before. As a result, many security leaders globally are turning to zero
A question to my colleagues who are Zero Trust experts: are there standards that have emerged to help guide Zero Trust deployments to implement consistent architecture choices or designs that meet specific levels of risk mitigation?
For example, I w
In the absence of a federal privacy law, that would establish unified privacy rights of citizens, I applaud Colorado, to the be latest state to enact legislature that protects its residents. States are leading the charge to protect American’s privacy
The attack was first detected on 2nd July and had spread to over over 30 MSPs and over 1,500 businesses in the US, AUS, EU, LATAM and Asia.
The customers received the malicious “VSA agent hotfix” pack that was able to overcome anti-virus protections
There are only 3 fundamental ways to stop attacks from motivated and intelligent adversaries.
Let’s identify and explore those options, and discuss how they may be applied to undermine Ransomware.
This video is the latest installment of a multi-part
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …