All Posts (2379)
This discourse explores the essentiality of cybersecurity fundamentals in both traditional IT spaces and the emerging landscape of Web 3.0. It underscores the importance of proactive threat intelligence and attribution methodologies while advocati
This discussion offers a comprehensive exploration of cybersecurity challenges, from user-level vulnerabilities to strategic risk management practices. By dissecting real-world incidents and industry insights, it sheds light on the evolving nature
This discussion unveils critical security vulnerabilities and an incident of unauthorized access, emphasizing the importance of robust security measures to prevent data breaches. While some details are withheld for confidentiality reasons, the nar
In the ever-evolving landscape of cybersecurity, attackers continuously refine their methods to exploit vulnerabilities in a variety of systems. One of the most effective ways they achieve this is through the use of automated tools and databases, w
This discussion emphasizes the importance of prioritizing understanding and proactive measures over relying solely on tools in addressing cybersecurity challenges. It underscores the necessity of comprehending potential attacks specific to an orga
In the digital age, stolen credentials have become a significant threat to enterprise security. These credentials, often harvested from various attack and breach databases, pose a critical risk to organizations worldwide. This blog explores wher
Despite comprehensive security practices aimed at mitigating vulnerabilities, ransomware attackers continue to achieve significant breaches by targeting a small fraction of critical CVEs. This blog explores the focus on these high-risk vulnerabi
This content addresses two critical security breaches in decentralized systems. Firstly, it discusses how attackers exploited vulnerabilities in the governance token system of a decentralized autonomous organization (DAO) called The DAO. By acquir
This blog offers insights into a hacker's perspective on defensive measures and concerns regarding detection and response capabilities. The speaker emphasizes the importance of monitoring for suspicious activities and implementing effective coun
we will explore essential operational capabilities necessary for ensuring the security and integrity of decentralized finance (DeFi) platforms. Among these capabilities is the ability to blacklist wallets, transfer funds, and pause or terminate
we will explore three recent incidents in the crypto space and personal experiences to extract valuable lessons that can help reduce the frequency of such events. While these incidents can be intriguing and sometimes exciting, it is in everyone's
Welcome to the CISO Platform "Best of the World" Security Webinar Series, a premier event featuring the world's leading cybersecurity minds. This series presents security content that is often hard to find and understand, featuring notable exper
This blog delves into two critical aspects of decentralized finance (DeFi) security: the manipulation of liquidity pools and the importance of proper validation in algorithmic decision-making. By examining a specific case of liquidity pool exploit
This blog explores the critical features and capabilities of GameFi contracts, focusing on security measures designed to protect user funds. By implementing options such as wallet blacklisting, pausing contracts, and escape mechanisms, GameFi plat
In late March, a significant incident involving the ERC-20 token Nua took place. This event was a price Oracle manipulation attack, exploiting vulnerabilities in the DeFi protocol's pricing mechanism. The attacker manipulated the liquidity pool bala
In the realm of cybersecurity, the quest for the best antivirus to shield against ransomware remains a paramount concern for organizations worldwide. While antivirus software plays a crucial role in detecting and mitigating threats, it's essential
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology Implementation: From…
- Created by: Biswajit Banerjee
- Tags: ciso, playbook, round table
Round Table Dubai 2025 | GISEC
- Description: CISO Playbook Round Table Overview :
Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.- Technology…
- Created by: Biswajit Banerjee
Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))
- Description:
We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.
As cyberattacks grow in…
- Created by: Biswajit Banerjee
- Tags: ciso, cyber insurance, dan bowden
CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta
- Description:
Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !
CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…
- Created by: Biswajit Banerjee