This webinar shares in-depth look at today’s wide range of evolving email threats, including their risks and impacts on businesses, and how machine learning and API-based inbox defense can address the gaps in the email gateway and help provide total
All Posts (2645)
It simply makes no sense to call for IoT devices to be certified safe-and-secure. Before you get bent out of shape, hear me out.
Regulations are unwieldy blunt instruments, best left as a last resort. Cybersecurity regulations are not nimble, tend
Fear, one of the most powerful drivers of all time. Movies, novels, companies, even I had the unfortunate chance to hear the following phrase directed to a coworker: " I can replace you with a script and I will save money".
Automation is the new catc
This report summarises the top breaches between mid-August till 15th September 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
The Most Common Breach Trends
I am seeing many security vendors developing products to unify solutions into a single management interface. I fear this is just a sales tactic to gain greater market share and not intended to help the plight of CISO’s
A recent article from ComputerWe
This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech. For reference click here
This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech. For reference click here
This is a Cheat Sheet for Security Assessment & Testing for the CISSP Exam created by Comparitech. For reference click here
This is a Cheat Sheet for Asset Security for the CISSP Exam created by Comparitech. For reference click here
This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech.
For reference click here
A free-flowing discussion about the past and future evolution of cybersecurity leadership. I had a great time sharing my personal experiences, industry insights, and a few rants in this podcast interview with Marco Ciappelli and Sean Martin of ITSP
The first warning sign was “hackproof” in the 360Lock marketing materials. As it turns out, with no surprise to any security professional, the NFC and Bluetooth enabled padlock proved to be anything but secure.
Intel has released patches for several security vulnerabilities in their Active Management Technology (AMT) and Intel Standard Manageability (ISM) platforms. One of them was a critical flaw in AMT that allowed remote privilege escalation CVE-2020-8
EC-Council is announcing the #TheNextBigThingInCyber skills development in a free online event on Sept 16th 9:30am EST. EC-Council's CEO, Jay Bavisi will discuss what it means to Humanize firewalls, build a new era of ethical hackers, empower cyber
Digitally altered and synthetic media are becoming more of a problem. Openly available tools, including AI Deep Learning, enable the easy modification of pictures and videos for distribution on the Internet. Most are benign; clearing up acne, impro
Numerous organizations have moved hurriedly to change their workforces during the COVID-19 pandemic so they can work remotely, actualizing new instruments and frameworks now and again as per the requirements.
According to new data, a poll revealed t
This webinar will provide a detail of Ransomware, it’s effect and preventive measures.
Key Takeaways:
o How we can be protected from Ransomware attacks.
o What are the best practices, which can be followed to prevent Ransomware attacks.
About Speake
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services Information Security Media Group (ISMG) ]
Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have noticed, it appea
[Posted on behalf Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author | University of Tennessee health science center]
IT and Knowledge Creation
This article focuses on the effective use of information technology
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
- Created by: Biswajit Banerjee
Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)
- Description:
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…
- Created by: Biswajit Banerjee
- Tags: ciso, sandro bucchianeri, nab
