
This blog was originally contributed by Apoorv Saxena, technical team, FireCompass over here

This blog was originally contributed by Apoorv Saxena, technical team, FireCompass over here
This session gives a brief overview about where does Data Privacy come from, What is GDPR, GDPR Key Principles, Data Subject Rights, Processor Liabilities, DPO Need, Global Risk at a Glance, What are the common Threats, Risk Based Methodology, Data P
Bugcrowd has released some interesting survey data that provides insights into the white-hat vulnerability researcher community.
Of note, most researchers were male (94%) and make less than $25k per year finding vulnerabilities. A vast majority were m
This is a cross post from original source at FireCompass here
Turkey may be the first customer for the Kargu series of weaponized suicide drones specifically developed for military use. These semi-autonomous devices have been in development since 2017 and will eventually be upgraded to operate collectively as
As a SaaS GRC pioneer, We have been hearing since this black swan event happened, that world wants to allow the topmost secure role in the company CISO also goes vCISO route.
2 things - Great deal of advantage
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
Biometrics, while an element of data security, is a unique attribute that should be treated in an extraordinary fashion.
Password
Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protect
[Posted on Behalf of Rajeev Shukla, Founder and CEO, Castellum Labs]
The world around you is altering in irrevocable ways. Software/s is eating the whole sectors, not just the jobs, anymore. Within next decade, "The Enterprises" and "The Jobs", wil
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
Let me ask you this: do smaller businesses (say, SMBs) get more security vendor lies than large enterprises? My past analyst experience certainly seems to suggest so. When I
[Posted on Behalf of Pushkal Mishra AVP IT & CISO HDFC ERGO Health Insurance Ltd)
The 2019 edition of Symantec threat report reveals that:
- One in 10 URLs are malicious
- More than 70 million records stolen from poorly configured *S3 buckets
- 56% ris
[Posted on Behalf of Gary Hayslip, CISO Softbank Investment advisor]
Recently, I have written and spoken on the subject of CISO burnout. I have stated my belief that the job is maturing so fast, it's harming many of the security professionals who se
Intel comes late to the game but will be delivering an embedded defense for Return Oriented Programming (ROP) types of cyber hacks. I first blogged about this back in Sept of 2016. Yes, almost four years have passed and I had hoped it would see the l
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
"AI Needs to Understand How the World Actually Works"
On Wednesday, February 26th, Clearview AI, a startup that compiles billions
[Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author ]
METT-T is an acronym for planning patrol mission utilized by the US Marine Corps. This acronym is also very useful when applied to planni
[Posted on Behalf of Subbu Iyer, Founder & chief designer architect Hreemm]
An emperor was once gifted two baby peregrine falcons. These species are known for their speed and predatory skills. He summoned the best trainer in his kingdom and handed
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
Why did the CapitalOne hacker do what she did?
Following forensic analysis related to the Capital One breach, a spokesperson for t
[Posted on Behalf of Gary Hayslip CISO Softbank Investment advisor]
Over the years in my career, I have heard some variation of this question from many of my peers. Usually, the discussion starts over a cold beverage as we catch up and discuss ho
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…