It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the customer base for the organizations. However, this
All Posts (2637)
We all understand the significance of cloud when it comes to economies of scale, reduced time to market, operational effectiveness and ease with which you can deploy applications to it and most of us are good in leveraging those benefits too. But how
Threat hunting or monitoring is the practice of actively seeking out cyber threats in an organization or network. A threat hunt can be conducted during a security incident, or pre-incident time to discover new and unknown attacks or breaches. Threat
"We're a tiny company, why would anyone want our data? It's not like we're making tens of millions in profit"
Unfortunately, I'm familiar with this mindset.
It was o
The VShield 2020 virtual conference is a can’t-miss cybersecurity event! Friday May 22nd
Bruce Schneier is delivering the keynote and multiple rooms/tracks will be available with many great sessions and informative panels.
I have the honor of being o
Social sites are the most widely used social networking site with over 2.6 billion monthly active users as of the first quarter of 2020. As a reason if which it has become the number 1 target of hackers.
1. Phishing
Phishing still is the most popular a
EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals.
I am excited to join the prestigious ranks of EC-Council’s International Advisory Board for CISOs. The board collaborates to share
(Posted On Behalf of Pushkal Mishra ,AVP IT & CISO, HDFC ERGO Health Insurance Ltd)
As a security professional we always wonder about new cyber threats and how the world is reacting to those. Since there are multiple industries with their specific ri
(Posted on Behalf of Dennis Leber, CISO, University of Tennessee Health Science Center)
From the Military Manual, - "CCD is the use of materials and techniques to hide, blend, disguise, decoy, or disrupt the appearance of military targets and/or the
A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position to understand how vulnerable major companies a
Cybersecurity in 2020 will be evolutionary but not revolutionary. Although there is always change and churn, much of the foundational drivers remain relatively stable. Attacks in the next 12 months are likely to persist in ways already known but ta
You've got Mail!
While the world continues to battle with the Corona pandemic, there is another pandemic unfolding in digital space. Businesses and people are seeing an unprecedented onslaught of cyberattacks. As organisations try to maintain the busi
This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post— so expect more posts about that.
Let’s first get this out of the way: there a
(this is cross-posted from Anton on Security)
As I am expanding my responsibilities to cover some exciting data security topics (like, say, our cloud data discovery DLP), I wanted to briefly discuss a few broader issues I have noticed related to moder
(Posted on Behalf of Amit Ghodekar)
Covid-19 has taken the world under it completely. Millions of people are infected due to this Virus and millions have lost their life as well. Most of the countries in the world have announced a complete lock-down
With most countries and companies in lockdown, training and learning institutes/apps started to offer courses with minimal or no cost. I was wondering what could be the motive behind these free courses and training. I could extract two things out of
Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management’s commitment for secure products, the respect for user privacy, the honesty of its marketing, and the design decisions that preserve a positive user exper
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
- Created by: Biswajit Banerjee
Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)
- Description:
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…
- Created by: Biswajit Banerjee
- Tags: ciso, sandro bucchianeri, nab
