Many organizations are looking for trusted advisors, and this applies to our beloved domain of cyber/information security. If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams.
Untrusted AdvisorAll Posts (2218)
Mention “alert fatigue” to a SOC analyst. They would immediately recognize what you are talking about. Now, take your time machine to 2002. Find a SOC analyst (much fewer of those around, to be sure, but there are some!) and ask him about alert fat
The present application was filed for quashing proceedings in a case pending for the offence punishable under Section 66-C and 67 of the Information Technology Act, 2000 (‘The IT Act, 2000’). The Hon. HC stated that it could not be concluded without
Sneak peek into the CISO Breakfast at Black Hat 2024! .. first few photos out
CISOPlatform is a community partner for the event which is co-hosted by Silicon Valley Bank, Stage One, First Rays Venture Partners, Latham & Watkins.
CISOPlatform is
In today’s rapidly evolving digital economy, the demand for robust cybersecurity measures is more critical than ever. Senior cybersecurity officers and Chief Information Security Officers (CISOs) face the dual challenge of defending their organizatio
As artificial intelligence (AI) capabilities advance, cyber attackers and defenders are entering a high-stakes arms race. Dark AI—malicious applications of AI for offensive purposes—leverages automation, precision, and adaptability to bypass traditio
Automated penetration testing uses specialized software to emulate cyberattacks on your IT systems. This helps find vulnerabilities before attackers do. It’s essential for strengthening your cybersecurity strategy through continuous and efficient ass
We are hosting an exclusive CISO Platform Talks session on Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype" featuring Hilal Ahmad Lone, CISO, Razorpay and Manoj Kuruvanthody, CISO & DPO, Tredence Inc.
In the evolving
CISA has raised the alarm about, the recently discovered CVE-2024-5910 in Palo Alto Networks’ Expedition tool. This vulnerability is being actively exploited, leaving organizations scrambling to secure their systems before attackers take advantage.
B
We had a community session on "Offensive Security: Breach Stories to Defense Using Offense" with Saravanakumar Ramaiah, (Director - Technology Risk Management, Sutherland) and Rajiv Nandwani (Global Information Security Director, BCG).
In this discus
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design weakn
I’m thrilled to join the incredible team at The Cyber Express as a member of their Editorial Advisory Board! It’s an honor to collaborate with an esteemed group of cybersecurity experts, all dedicated to delivering accurate, timely, and valuable insi
In the evolving landscape of cybersecurity, protecting sensitive customer data is paramount, especially when it comes to payment information. One innovation that has gained traction in recent years is the dynamic CVV (Card Verification Value). For Ch
𝗜𝗺𝗽𝗹𝗲𝗺𝗲𝗻𝘁 𝗗𝘆𝗻𝗮𝗺𝗶𝗰 𝗖𝗩𝗩𝘀
𝘈𝘵𝘵𝘦𝘯𝘵𝘪𝘰𝘯 𝘙𝘉𝘐: The Future of Secure Banking is Here –
In today’s digital-first world, credit and debit card frauds pose significant challenges to both consumers and financial institutions. As card transactions grow, so do the ris
A “Perfect” 10 vulnerability score is not what users of Cisco Ultra-Reliable Wireless Backhaul (URWB) systems were expecting. The recently discovered cybersecurity vulnerability CVE-2024–20418 is remote, easy, and gives full Admin rights to the devi
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding!
I bumped into Dan Lohrmann and Nancy Rainosek before their panel with Sue McCauley on CISO challenges. We had some very int
Why spend the time, money, and resources on a security metrics program anyway? This section will review the Benefits of a Security Metrics Program
A Lesson for Security Metrics from the Traffic Safety Industry
Starting and maintaining an security
Why SEBI’s New Guidelines Make Automated Red Teaming Essential for Security Teams
When was the last time you looked at your organization’s security as if you were the one trying to break in? SEBI’s recent guidelines on cybersecurity call for exactly
We are hosting an exclusive CISO Platform Talks session on "Offensive Security: Breach Stories to Defense Using Offense" featuring Saravanakumar Ramaiah, Director - Technology Risk Management, Sutherland and Rajiv Nandwani, Global Information Securit
This is an interesting tactic by cyber attackers — using virtual machine hard drive files to bypass email malware filters!
Never underestimate the creativity and resourcefulness of intelligent adversaries in finding ways to leverage technology for the
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
- Description:
Speaker: Hilal Ahmad Lone, CISO at Razorpay.
Moderator: Manoj Kuruvanthody, CISO & DPO at Tredence Inc.
Topic: Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
Date: Nov 22, 2024 Friday
Time: 12:00 PM ISTKey…
- Created by: Biswajit Banerjee
- Tags: aisolutions