In the rapidly evolving field of software development, integrating advanced AI models like ChatGPT can provide significant advantages in enhancing user experience, automating customer support, and facilitating various development tasks. However, as w
All Posts (2360)
Details emerge on how a bad CrowdStrike update was allowed to land on Windows systems and cause over 8 billion computers to fail.
I discuss their leadership and break down the preliminary Post Incident Review document to reveal the point of failure fo
Fireside Chat On "The Future Of AI In Cybersecurity"
With Bruce Schneier (Cyptographer, author & security guru) and Bikash Barai (Co-founder, CISOPlatform & FireCompass)
>> Click Here To Read The Executive Summary.
![]() |
Featured Blogs To R
Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it to over 8 million devices and caused widespread global o
India's Data Protection Law namely The Digital Personal Data Protection Act or the DPDPA has been a topic of much discussion and debate in recent times. This Act aims to regulate the collection, storage, and processing of personal data in India, and
Let’s break down the CrowdStrike outage in non-technical terms!
Thanks for watching! Be sure to subscribe for more Cybersecurity Insights!
Follow me on LinkedIn: https://www.linkedin.com/in/matthewrosenquist/ and on my YouTube channel for more Cybersec
On July 19, 2024, a CrowdStrike update caused a global IT outage, impacting millions of Windows devices. In this article on ‘crowdstrike microsoft outage and what we learned as CISOs,’ we explore the event’s specifics and discuss key lessons for IT l
Not sure who need this resource, but Microsoft updated its Recovery Tool for the CrowdStrike issue on Windows endpoints:
Here is the link to the Microsoft Tech Community Support Site:
https://techcommunity.microsoft.com/t5/intune-customer-success/new-r
The recent CrowdStrike outage, that continues to have global implications, reinforces the fact that cybersecurity solutions help manage cyber attack risks, but can also be a source of risk. The level of system access, which is necessary to provide se
|
The panel discussion delved into the critical aspects of AI adoption within enterprises, emphasizing key trends that CISOs should prioritize. The conversation highlighted several pivotal areas. First and foremost, readiness emerged as a fundamental r
As an AT&T customer, I did receive the unwelcome news that they suffered a data breach.
Here is a rundown for what you should to know.
BREACH DETAILS
· This is a sizable data breach of about 109 million customers
· Call and text interactions from May 1,
CISA released 7 Industrial Control Systems (ICS) advisories in July, which provide timely information about current security vulnerabilities and exploits.
1> Johnson Controls Kantech Door Controllers
ICSA-24-184-01 Johnson Controls Kantech Door Contr
Banks face multiple guidelines from various authorities on cybersecurity incident reporting. Consistent, documented procedures (SOPs) are essential for effective response, regardless of timing or personnel involved.
Action Plan:
- Understand the Line of
In today's rapidly evolving technological landscape, Artificial Neural Networks (ANNs) have emerged as a cornerstone of artificial intelligence, revolutionizing various fields including cybersecurity. Inspired by the intricacies of the human brain, A
Generative AI, particularly through the lens of large language models (LLMs), represents a transformative leap in artificial intelligence. With advancements that have fundamentally altered our approach to AI, understanding and leveraging these techno
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology Implementation: From…
- Created by: Biswajit Banerjee
- Tags: ciso, playbook, round table
Fireside Chat On The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem
- Description:
We’re excited to bring you an insightful fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operations Specialist, BJC Healthcare) and Erik Laird (Vice President - North America, FireCompass), where we delve deep into the hidden layers of cybercrime, exploring how stolen data is monetized, its impact, and how organizations can fight back.
The cybercrime ecosystem is thriving, with stolen data fueling…
- Created by: Biswajit Banerjee
- Tags: fireside chat, stolen data, matthew maynard, ciso
CISO Cocktail Reception At RSAConference USA, San Francisco 2025 !
- Description:
We are excited to invite you to the CISO Cocktail Reception if you are there at the RSA Conference USA, San Francisco 2025. It will be hosted aboard a private yacht, so that our CISO's can enjoy the beautiful San Francisco skyline while cruising the Bay Area! This event is organized by EC-Council with CISOPlatform and FireCompass as proud community partners.
Yacht Party…
- Created by: Biswajit Banerjee
- Tags: ciso, usa, san francisco, rsaconference 2025
Round Table Dubai 2025 | GISEC
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology…
- Created by: Biswajit Banerjee