[Posted On Behalf of Matthew Rosenquist, CISO & Cybersecurity Strategist]
Protect yourself from creepy hackers that watch people on their home cameras.When it comes to cameras installed inside of homes, there is always a risk of so..
Added by CISO Platform on February 26, 2021 at 7:05pm —
No Comments
This report summarises the top breaches between mid – December till 15th January 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
This report summarises the top breaches between mid – November till 15th December 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
In the wake of current ransomware attacks and breaches, Cisoplatform members can avail a free ransomware risk assessment here…
This report summarises the top breaches between mid – September till 15th October 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
Key Points To Be Discussed
1. Proliferation of Cloud SAAS Applications
2. Key Characteristics
3. Key Risks
4. Discovery
5. Building a Process
6. Auditing SAAS applications Technology to protect data and access to Cloud…
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
This webinar shares in-depth look at today’s wide range of evolving email threats, including their risks and impacts on businesses, and how machine learning and API-based inbox defense can address the gaps in the email gateway and help provide total email protection against attacks.
1. Defend against sophisticated email threats that are able to bypass defenses and wreak havoc using backdoor techniques, including spoofing, social engineering, and fraud. 2. Protect employees at the…
This report summarises the top breaches between mid-August till 15th September 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
Numerous organizations have moved hurriedly to change their workforces during the COVID-19 pandemic so they can work remotely, actualizing new instruments and frameworks now and again as per the requirements.
According to new data, a poll revealed that 71% of security professionals had reported an increase in security threats or attacks since…
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services Information Security Media Group (ISMG) ]
Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have noticed, it appears we are not only failing to improve our cybersecurity defenses, but recent data suggests we are falling even further behind while the bad guys are running ahead.
[Posted on behalf Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author | University of Tennessee health science center]
IT and Knowledge Creation
This article focuses on the effective use of information technology in the process of knowledge creation and knowledge sharing.
An example of an organization is also included that has been successfully implemented…
[Posted on behalf of Steve King, Director, Cybersecurity Advisory Services Information Security Media Group (ISMG) ] (source)
By now, you’ve been inundated with security predictions from all the major vendors and talking heads. I won’t repeat what all of them have said, because well, why would anyone do that?
[Posted on behalf of Anton Chuvakin Security Strategy - chronicle Google] (Source)
A lot of people seem to think that matching technical threat intelligence (TI) to logs for threat detection is a great idea. Some people also think this is very easy.
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
This post is a convergence of a few things: our recent foray into more basic security areas (such as from threat hunting to vulnerability management), my experiences at a recent Security Summit and of course recent ransomware-like incidents (from WannaCry to Petya).
So, we analysts lots of do 1on1s at Gartner Events, these are essentially in-person client inquiry. It so happened…
What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue