As we emerge from an intense season of industry conferences like Infosec and RSA, I believe the cybersecurity community finds itself at a critical juncture. While hot topics like AI’s role in combating hacker threats has dominated discussions, an equ
Blog (655)
Microsoft has stumbled yet again. Its Recall feature — intended to enhance user experience by periodically capturing screenshots — has become a glaring example of how well-intentioned technology can undermine security and privacy.
Does this sound fami
The brutal reality is that cybersecurity predictions are only as valuable as their accuracy. As 2024 comes to a close, I revisit my forecasts to assess their utility in guiding meaningful decisions.
Anyone can make predictions (and far too many do), b
We are hosting an exclusive Best of the World Talks session on "How the rapidly evolving expectations of cybersecurity are forcing CISOs to adapt and show more value to their organization?" featuring Matthew Rosenquist (CISO at Mercury Risk & Complia
Part 2 of Interview with Enoch Long
As cyber threats become more sophisticated, the need for visibility across your organization’s cyber asset environment and proactive strategies has become increasingly critical. According to Enoch Long, Field CISO
Cybersecurity is a constantly changing battleground, where threats are evolving more rapidly than ever before. For Enoch Long, Field CISO at JupiterOne, navigating this complex environment requires not only technical expertise, but also a calm and st
Spooky Cyber Stats And Trends In Time For Halloween
FORBES Contributor
Global Thought Leader in Cybersecurity and Emerging Tech
Spooky Cyber Stats and Trends in Time for Halloween
Every year the stats on cyber-attacks seem to get spookie
Dear Friends & Colleagues, October is Cybersecurity Awareness Month. Actually, cybersecurity awareness really needs to be every month! Below is some content for the quest. Also, happy to announce that my book "Inside Cyber" will be arriving at bookst
Cybersecurity expert Chuck Brooks discusses the top five issues in threat detection and how organizations can reduce the risk of cyber-attacks in 2024.
https://search.app/Miwuwt4EtELyDj9F8
Interview by Brian Kelly
I recently sat down with Ch
Protecting the frontier of space systems is unquestionably a security priority for governments and industry. Due to our increasing reliance on space, and particularly satellites, for communications, security, intelligence, and business, satellite and
In today's highly competitive digital landscape, user experience (UX) is more than just a buzzword—it's a pivotal factor in determining the success of your digital products. Whether you're building a website, an app, or a complex digital system, a se
Cybercriminals all over the world have leveraged this technology’s increased anonymity to buy and sell illegal goods, services, stolen data, underground infrastructure and force victims to pay ransom. While blockchain analysis enables researchers and
Microsoft will release a new Teams feature that allows users to clone their voice so the system can translate their conversation into different languages in real time. However, this amazing technology has a dark side as malicious attackers may misuse
You can buy ransomware for as little as $66, or hire a threat actor for $250. And if you look hard enough, you can even get a phishing kit for free on underground forums. Although these illicit methods may not be expensive, the damage they inflict ca
Basic structure of legal argument
- If conditions A, B and C are satisfied, then legal consequences X, Y and Z follow. (Major premise: legal rule)
- Conditions A, B and C are satisfied (or not). (Minor Premise: the facts of the case)
- Therefore, legal co
1. Art 21 of the Constitution guarantees fundamental right to life and personal liberty. This article of Constitution has been interpreted by the Judiciary with widest amplitude so as to include several other rights such as right to food and shelter,
Learn Modern SOC and D&R practices for free from Google! Yes, really! That’s the message. Join *hundreds* of others who already signed up!
Now, with full details….
After some ungodly amount of work, the original ASO crew (but really Iman!) put toget
Do I go to my Cloud Service Provider (CSP) for cloud security tooling or to a third party vendor?
Who will secure my cloud use, a CSP or a focused specialty vendor?
Who is my primary cloud security tools provider?
This question asked in many ways ha
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology Implementation: From…
- Created by: Biswajit Banerjee
- Tags: ciso, playbook, round table
Round Table Dubai 2025 | GISEC
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology…
- Created by: Biswajit Banerjee
Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))
- Description:
We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.
As cyberattacks grow in…
- Created by: Biswajit Banerjee
- Tags: ciso, cyber insurance, dan bowden
CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta
- Description:
Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !
CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…
- Created by: Biswajit Banerjee