Simply put,penetration testing as a service or PTaaS is a continuous guard against cyber threats, offering an ongoing cycle of testing that traditional penetration tests don’t provide. This service combines the insights of security experts with the e
All Posts (2360)
A program that involves several processes to run simultaneously without having to wait for completion of execution for previous ones is called Asynchronous programming. When data driven tasks are done sequentially then it might spoil the user experie
The Cybersecurity Vault - episode 34, with guest Chase Cunningham.
We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how they will maneuver to take advantage.
Chase’s LinkedIn
As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust security mindset and a security-first approach withi
When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad.
TL:DR Researchers found a vulnerability in a cryptocurrency exchange. They notified the company, but then exploited the bug to
Artificial intelligence is the most powerful cutting edge technology that uses computer systems that are programmed with machine learning abilities, has capabilities of performing specific tasks that is beyond the capabilities of human mind. Human br
Reuven Cohen, who goes by the Twitter handle @ruv, has recently been experimenting with using GPT to power attack bots. He recently posted this on his Facebook page after being able to create such an attack bot very quickly:
“Autonomous AI Hack Bots
Live tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And Security For All!
Matthew Rosenquist, CISO and Cybersecurity Strategist at Mercury Risk and Compliance, Inc., will be joining Jonathan Kimmi
Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data brokers, digital extortionists, and malicious insiders!
In today’s video, I discuss the risks and what Microsoft should do to protect us
Operation Endgame has taken down a major cyber criminal infrastructure. This is important, but likely not for the reasons you may think.
The multi-national law enforcement effort, led by EUROPOL, seized over 100 servers and 2 thousand domains that hos
The discussion explores the potential impact of cybersecurity incidents, such as the SolarWinds case, on the insurance industry. There's speculation about whether insurers will adapt their offerings to accommodate the demand for specialized coverage,
The discussion revolves around the responsibilities of CISOs and other senior officers regarding cybersecurity disclosures, the potential transition of accountability, and the feasibility of negotiated contract clauses for cybersecurity protections.
The discussion addresses the shifting responsibilities within organizations regarding cybersecurity disclosures, particularly in the context of CISOs and their relationship with other senior officers. It explores the possibility of transitioning acco
The discussion centers on the inadequacies of identity access management (IAM) practices in software development within a cloud-first model across various enterprises. It highlights the necessity of incorporating security measures early in the softwa
The conversation delves into the complexities of cybersecurity management, including the responsibilities of CISOs, the implications of security breaches, and potential changes in insurance coverage. It explores the challenges faced by CISOs in nego
The discussion explores the complex dynamics between regulatory actions, cybersecurity practices, and the responsibilities of CISOs. It delves into the consequences of regulatory overreach on the industry and contrasts differing viewpoints on the rol
The discussion examines the multifaceted perspectives surrounding cybersecurity disclosures, focusing on the responsibilities of CISOs, expectations of shareholders, and the rights of customers. The conversation also explores how CISOs should adapt i
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology Implementation: From…
- Created by: Biswajit Banerjee
- Tags: ciso, playbook, round table
Fireside Chat On The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem
- Description:
We’re excited to bring you an insightful fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operations Specialist, BJC Healthcare) and Erik Laird (Vice President - North America, FireCompass), where we delve deep into the hidden layers of cybercrime, exploring how stolen data is monetized, its impact, and how organizations can fight back.
The cybercrime ecosystem is thriving, with stolen data fueling…
- Created by: Biswajit Banerjee
- Tags: fireside chat, stolen data, matthew maynard, ciso
CISO Cocktail Reception At RSAConference USA, San Francisco 2025 !
- Description:
We are excited to invite you to the CISO Cocktail Reception if you are there at the RSA Conference USA, San Francisco 2025. It will be hosted aboard a private yacht, so that our CISO's can enjoy the beautiful San Francisco skyline while cruising the Bay Area! This event is organized by EC-Council with CISOPlatform and FireCompass as proud community partners.
Yacht Party…
- Created by: Biswajit Banerjee
- Tags: ciso, usa, san francisco, rsaconference 2025
Round Table Dubai 2025 | GISEC
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology…
- Created by: Biswajit Banerjee