[Posted on Behalf of Sam Jones Cyber-Man | Helping SMEs get 98% more secure]
Hackers know you're at home and they know your network is vulnerable...
With the UK Government putting pressure on businesses to promote social distancing to avoid the spre
[Posted on Behalf of Sam Jones Cyber-Man | Helping SMEs get 98% more secure]
Hackers know you're at home and they know your network is vulnerable...
With the UK Government putting pressure on businesses to promote social distancing to avoid the spre
[Posted on behalf of Dinesh Kumar Aggarwal Founder | CISO | Architect | Cyber Security Practitioner | Information Security Blogger & Speaker]
We are in the beginning of Year 2017 and 2016 has been a year of ransomware attacks. This is expected to g
How will AI change the strategies of cybersecurity? Where will we see the first big impacts of attackers using AI?
Watch the Cyber Risk Leaders podcast...
Shamane Tan and Carmen Marsh were wonderful hosts. I had a fantastic time talking about AI and
[Posted On Behalf of Rajeev Shukla Chief Products Officer <> Chief Strategy Officer <> Chief Executive Officer Building Next Gen Cyber Security Venture at Stealth Mode ]
CISO is one leadership role, which has gone through more changes on competence,
A new study by Cambridge Cybercrime Centre titled Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies concludes that cybercrime is boring and recommends authorities change their strategy to highlight the tedium in ord
[Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author |]
What have we learned from this Global event?
Here are some of my thoughts; we learned getting back to basics is paramount.
In the haste
[Posted on Behalf of Steve King , Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
From CrowdStrike’s 2018 report titled Securing the Supply Chain: “Although almost 90 percent of the respondents believe they are
It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the customer base for the organizations. However, this
We all understand the significance of cloud when it comes to economies of scale, reduced time to market, operational effectiveness and ease with which you can deploy applications to it and most of us are good in leveraging those benefits too. But how
Threat hunting or monitoring is the practice of actively seeking out cyber threats in an organization or network. A threat hunt can be conducted during a security incident, or pre-incident time to discover new and unknown attacks or breaches. Threat
"We're a tiny company, why would anyone want our data? It's not like we're making tens of millions in profit"
Unfortunately, I'm familiar with this mindset.
It was o
The VShield 2020 virtual conference is a can’t-miss cybersecurity event! Friday May 22nd
Bruce Schneier is delivering the keynote and multiple rooms/tracks will be available with many great sessions and informative panels.
I have the honor of being o
Social sites are the most widely used social networking site with over 2.6 billion monthly active users as of the first quarter of 2020. As a reason if which it has become the number 1 target of hackers.
1. Phishing
Phishing still is the most popular a
EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals.
I am excited to join the prestigious ranks of EC-Council’s International Advisory Board for CISOs. The board collaborates to share
(Posted On Behalf of Pushkal Mishra ,AVP IT & CISO, HDFC ERGO Health Insurance Ltd)
As a security professional we always wonder about new cyber threats and how the world is reacting to those. Since there are multiple industries with their specific ri
(Posted on Behalf of Dennis Leber, CISO, University of Tennessee Health Science Center)
From the Military Manual, - "CCD is the use of materials and techniques to hide, blend, disguise, decoy, or disrupt the appearance of military targets and/or the
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…