Priyanka Aash posted a blog post
About the Vulnerability
On January 8, Ivanti disclosed two critical vulnerabilities affecting its Connect Secure, Policy Secure, and Neurons for Zero Trust Access (ZTA) gateway devices. These flaws include:

CVE-2025-0282: A stack-based buffer…
Thursday
Priyanka Aash posted blog posts
Nov 18, 2024
Priyanka Aash posted a blog post
CISA has raised the alarm about, the recently discovered CVE-2024-5910 in Palo Alto Networks’ Expedition tool. This vulnerability is being actively exploited, leaving organizations scrambling to secure their systems before attackers take…
Nov 12, 2024
Priyanka Aash posted a blog post
As per the SEBI circular "SEBI/HO/ ITD-1/ITD_CSC_EXT/P/CIR/2024/113" dated 20 Aug 2024 it is mandatory for all MIIs and Qualified REs to be compliant to the below DE.DP.S4 CART guidelines.
SEBI’s CART Requirement (SEBI/HO/…
Nov 6, 2024
Suresh S commented on Priyanka Aash's blog post 14 Cyber Security GPTs for CISOs & Cybersecurity Teams
"Amazing collection !"
Oct 7, 2024
Priyanka Aash posted a blog post
Selecting the right attack surface management vendor is essential for safeguarding sensitive data and securing your organization against vulnerabilities. Attack surface management involves identifying and mitigating risks across your digital…
Aug 11, 2024
Priyanka Aash posted an event

Oct 17, 2024 to Oct 18, 2024

Chennai, Mahabalipuram

Aug 8, 2024
Priyanka Aash posted a blog post
The Gartner Hype Cycle 2024 shows how existing technologies have been integrated into broader platforms for more comprehensive exposure management.
Key changes in Gartner Hype Cycle 2024:


Exposure Assessment Platforms now include both :…
Aug 8, 2024
Priyanka Aash posted a blog post
Cyber Security has rapidly evolved by including AI-driven tools like Generative Pre-trained Transformers (GPTs). Here's an overview of the impactful cyber security GPTs that might be helpful for Chief Information Security Officers (CISOs) and their…
Aug 8, 2024
Priyanka Aash posted a video
Key Gaps in Today's Supply Chain Security & How to Build Resilience:

Why do usual certifications like ISO 27001 or risk management services don’t see the entire supplier risk?
What additional controls does your organization need if you are…
Aug 6, 2024
Priyanka Aash posted blog posts
Aug 6, 2024
Priyanka Aash posted a blog post
On July 19, 2024, a CrowdStrike update caused a global IT outage, impacting millions of Windows devices. In this article on ‘crowdstrike microsoft outage and what we learned as CISOs,’ we explore the event’s specifics and discuss key lessons for IT…
Jul 22, 2024
Priyanka Aash posted a blog post
CISA released 7 Industrial Control Systems (ICS) advisories in July, which provide timely information about current security vulnerabilities and exploits.
1> Johnson Controls Kantech Door Controllers
ICSA-24-184-01 Johnson Controls Kantech Door…
Jul 17, 2024
Priyanka Aash posted a blog post
Simply put,penetration testing as a service or PTaaS is a continuous guard against cyber threats, offering an ongoing cycle of testing that traditional penetration tests don’t provide. This service combines the insights of security experts with the…
Jul 1, 2024
Priyanka Aash posted a video
An exclusive Fireside Chat at CISOPlatform Summit 2024 with cybersecurity legend Bruce Schneier and Bikash Barai.Bruce is one of the foremost cryptographers and a leading mind in cybersecurity. Often referred to as the "security guru", he is the…
Jul 1, 2024
Priyanka Aash posted a blog post
Reuven Cohen, who goes by the Twitter handle @ruv, has recently been experimenting with using GPT to power attack bots. He recently posted this on his Facebook page after being able to create such an attack bot very quickly:

“Autonomous AI Hack…
Jun 19, 2024
More…