While speaking with CISOs and security experts globally and in India, one question that came up repeatedly was, "Where should CISOs focus their time in 2021?"
Hence from CISO Platform in association with TIE and CIIE.co, we are doing a series of pa
While speaking with CISOs and security experts globally and in India, one question that came up repeatedly was, "Where should CISOs focus their time in 2021?"
Hence from CISO Platform in association with TIE and CIIE.co, we are doing a series of pa
Cross-posted from Anton on Security
This is a quick “let’s think about it together” post focused on the future of cloud security.
Our logical starting point is: “Through 2025, 99% of cloud security failures will be the customer’s fault.” (source: Gartn
Cross-posted from Anton on Security.
This is about the Security Operations Center (SOC). And automation. And of course SOC automation.
Let’s start from a dead-obvious point: you cannot and should not automate away all people from your SOC today. Or, as
As technological advances create business opportunities for businesses, they also present huge security risks of information of the same businesses. According to the U.K. government’s Cybersecurity Breaches Survey 2019, 32% of UK businesses reported
Quality Assurance processes today thrive on software test automation techniques. Automation has been a revolutionary tool for the testing community simply due to its effectiveness and reliability. Test automation is the practice of utilizing special
Securing the Immediate Shift to Remote Work
Securing a Network Infrastructure has never been a static activity. Adjustments are always needed but are normally related to disruptive technologies that are introduced over time. What we are experiencing n
Microsoft Teams ‘Potential Misuse Leading To Cloud Based Data Leakage’
Article By: Abhishek Pratap Singh
Cyber Security and ISA Leader, Speaker & Author
https://www.linkedin.com/in/abhishek-pratap-singh-85b23a33
During Covid-19 outbreak, in order to supp
[Posted On Behalf of Matthew Rosenquist, CISO & Cybersecurity Strategist]
Protect yourself from creepy hackers that watch people on their home cameras.When it comes to cameras installed inside of homes, there is always a risk of so..
I had such a great time talking about the challenges, chaos, and importance of cybersecurity to preserve trust in digital technology.
6 Questions in a 9 Minute format!
Thanks Rick Mischka and ShortArm Solutions, Inc. / Cyber Pro Podcast.
In our recent Fireside chat episode, we had a very well known author and cybersecurity professional, Dan Lohrmann, presently the CSO and Chief Strategist at Security Mentor Inc, and Bikash Barai, Co-Founder FireCompass discuss a bunch of things on
It appears France is the main victim for this recent attack which has several uncanny similarities to the SolarWinds exploitation that exposed thousands of U.S. government agencies, critical infrastructure organizations, and major businesses. Let me
CISO Platform 100, 2021 (India):
Applications for the Top 100 CISO Awards is open for 2021. Kindly fill in your responses asap.
We are very happy to announce that nominations are now open for the 13th Edition of Top 100 CISO Awards - India's 1st Sec
The recent attempt by malicious hackers to poison a Florida city water supply, highlights the public risks and exposure of critical infrastructures. Luckily, this incident was detected by an observant technician and mitigated before people were hurt
Statistics indicate that over 4.5 billion records of data were compromised in 2019. With hackers increasingly adopting modern cyber tools, these figures will increase in 2020. One strategy that hackers use when attacking a system is to gather relev
IoTForum and CISOPlatform co-organized IoTSecurity Panel brings together CyberSecurity veterans from large security consulting companies, Fortune 1000 securityvendors, startups, academicians and end users. Panelists will delve on the state of the art
I get frustrated by shortsighted perceptions, which are misleading and dangerous is far easier to vilify something people don't fully understand.
Here is another article, titled Bitcoin is Aiding the Ransomware Industry, published by Coindesk, implyin
Researchers ranked 96 countries by their collection and use of biometric data. Biometrics are gathered and stored as part of international travel, banking, law enforcement, healthcare tracking, and general surveillance by governments.
The worst offen
Happy Privacy Day! Now go check to see if EMOTET botnet has stolen your email and password.
Europol and a team of global law enforcement have successfully taken down part of the EMOTET botnet infrastructure and seized private data harvested by the c
The SolarWinds compromise showed that supply-chain attacks are possible and the ramifications can be tremendously impactful. Other nation states will be investing in efforts to duplicate this success. That makes IT tools, security products, hardware
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …