[Posted on Behalf of Steve King , Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
From CrowdStrike’s 2018 report titled Securing the Supply Chain: “Although almost 90 percent of the respondents believe they are
[Posted on Behalf of Steve King , Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
From CrowdStrike’s 2018 report titled Securing the Supply Chain: “Although almost 90 percent of the respondents believe they are
It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the customer base for the organizations. However, this
We all understand the significance of cloud when it comes to economies of scale, reduced time to market, operational effectiveness and ease with which you can deploy applications to it and most of us are good in leveraging those benefits too. But how
Threat hunting or monitoring is the practice of actively seeking out cyber threats in an organization or network. A threat hunt can be conducted during a security incident, or pre-incident time to discover new and unknown attacks or breaches. Threat
"We're a tiny company, why would anyone want our data? It's not like we're making tens of millions in profit"
Unfortunately, I'm familiar with this mindset.
It was o
The VShield 2020 virtual conference is a can’t-miss cybersecurity event! Friday May 22nd
Bruce Schneier is delivering the keynote and multiple rooms/tracks will be available with many great sessions and informative panels.
I have the honor of being o
Social sites are the most widely used social networking site with over 2.6 billion monthly active users as of the first quarter of 2020. As a reason if which it has become the number 1 target of hackers.
1. Phishing
Phishing still is the most popular a
EC-Council is a leader in providing training, sharing knowledge, and being a resource for cybersecurity professionals.
I am excited to join the prestigious ranks of EC-Council’s International Advisory Board for CISOs. The board collaborates to share
(Posted On Behalf of Pushkal Mishra ,AVP IT & CISO, HDFC ERGO Health Insurance Ltd)
As a security professional we always wonder about new cyber threats and how the world is reacting to those. Since there are multiple industries with their specific ri
(Posted on Behalf of Dennis Leber, CISO, University of Tennessee Health Science Center)
From the Military Manual, - "CCD is the use of materials and techniques to hide, blend, disguise, decoy, or disrupt the appearance of military targets and/or the
A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position to understand how vulnerable major companies a
Cybersecurity in 2020 will be evolutionary but not revolutionary. Although there is always change and churn, much of the foundational drivers remain relatively stable. Attacks in the next 12 months are likely to persist in ways already known but ta
You've got Mail!
While the world continues to battle with the Corona pandemic, there is another pandemic unfolding in digital space. Businesses and people are seeing an unprecedented onslaught of cyberattacks. As organisations try to maintain the busi
This post is my admittedly imperfect attempt to “reconnect” data security controls to threats. It is also my intent to continue pulling on the thread I touched in this post— so expect more posts about that.
Let’s first get this out of the way: there a
(this is cross-posted from Anton on Security)
As I am expanding my responsibilities to cover some exciting data security topics (like, say, our cloud data discovery DLP), I wanted to briefly discuss a few broader issues I have noticed related to moder
(Posted on Behalf of Amit Ghodekar)
Covid-19 has taken the world under it completely. Millions of people are infected due to this Virus and millions have lost their life as well. Most of the countries in the world have announced a complete lock-down
With most countries and companies in lockdown, training and learning institutes/apps started to offer courses with minimal or no cost. I was wondering what could be the motive behind these free courses and training. I could extract two things out of
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …