Welcome to CISO Platform's Panel! CISO Platform is the world's first online community dedicated exclusively to senior security executives, including CISOs, CIOs, and cybersecurity managers. The platform's vision is simple yet powerful: enable senior…
In this episode of the CISOPlatform QnA, we dived into the recent Securities and Exchange Commission rules or SEC rules, that are setting a new standard for cybersecurity incident reporting, and Denise, our very own community manager at CISOPlatform…
Penetration testing, often referred to as "pen testing" or "ethical hacking," is a cybersecurity assessment technique used to evaluate the security of computer systems, networks, applications, or other digital environments. The primary purpose of…
I have recently reviewed DocuSign, DocuSign and SpringCM recently got merged to become one organization.
I reviewed their SOC reports and their workflows. I think it is a safe application to use.
"Hello wonderful team, I would like to nominate myself - https://www.linkedin.com/in/shamane/
Shamane Tan, Chief Growth Officer, Author and TEDx Speaker:
Shamane Tan works with C-Suite and executives on managing cyber risk as part of their business…"
"After the detection of vulnerabilities in Zoom, presently we have restricted usage to:
1) Meetings on non-critical issues
2) General Staff interactions
3) Education & Training Sessions
until they come out with secure solutions.
We do not conduct any…"
"We use BlueJeans and Cisco Webex.
Though we have Ms Teams, we have not started using it actively. Can any one share a roadmap they used to deploy Teams, hopefully with full features?"
"It's good opportunity additional one hour extra not an Issue at all. We are saving our daily travel time ..which can be utilised here and achieve this goal easily."
"Hi, Sorry to reply late. I was not connected to the portal for a long time.
In my opinion, Team Viewer is safe if a proper licensed version is used. Free versions of any such tool will prone to security, privacy and compliance risks.
Stay safe!"
"Refer to recent posts of tech. analyst, it seems that Zoom app is vulnerable to security as it does not have end to end encryption. They claim it but actually their end to end encryption is between host/ guest to Zoom server and it gets decrypted at…"
So, looks like maintaining genuine identity on many areas still is a huge security and privacy concern.And how many are you are trying to address it withing technology?
And how many of you think that Spam can be used positively too?
Comments
Per the email address it was a She :)
So, looks like maintaining genuine identity on many areas still is a huge security and privacy concern.And how many are you are trying to address it withing technology?
And how many of you think that Spam can be used positively too?
Thank you! Surprised to recieve spams from this portal...Otherwise hope to get the best out of this networking portal..
Thank you very much !
Thanks...
Thanks....
Thanks to all.
"Information without Information Security is just like sending letter without an envelope".
Thanks Priyanka
Thank you Priyanka
Thanks for inviting me
Thanks to All he earlier members and to you Priyanka.
Pradeep Yadav