Here’s a capability matrix that organizations can refer to when evaluating potential attack surface management or external attack surface management or EASM vendors.
All Posts (2214)
This blog discusses essential questions that organizations should consider when evaluating potential EASM vendors, focusing on features, support, and integration capabilities.
External Attack Surface Management (EASM) is a critical component in ide
The arms race continues between those attempting to detect GenAI-created content and those who want to keep their origins concealed. For example, detecting if ChatGPT was employed to write content, such as academic papers. According to reports, OpenA
The recent CrowdStrike outage provides valuable lessons in how to avoid causing problems and being more resilient when faced with 3rd party vendor issues. CEOs, CIOs, and Board members have a clear responsibility to protect the business and the inve
The Supreme Court struck down the Chevron Doctrine, sharply cutting back the power of federal agencies to interpret the laws they oversee and ruled that courts should rely on their own interpretation of ambiguous laws. The ramifications will have rip
California’s Department of Motor Vehicles will implement a blockchain to prevent vehicle title fraud. They will use Ava Labs’s Avalanche blockchain to allow over 39 million residents to claim and access their vehicle titles.
The online service is int
Tackling the biggest problems in cybersecurity requires superb insights and collaboration across the industry. This CISO Advisory Board will be a catalyst for constructive communication, practical innovation, and a showcase for leadership that drives
Held on 30th May, Thursday, at Shangri-La in Bangalore, the CISOPlatform Summit is known as Asia's largest IT security conference. This year's summit continued its tradition of fostering collaboration and helping the community make better security de
The Cybersecurity Vault - episode #36, with guest Ira Winkler
Today we are going to talk about the massive global IT outage, effecting over 8 million devices, caused by the cybersecurity vendor CrowdStrike. Although not a cyberattack, this incident i
In the rapidly evolving field of software development, integrating advanced AI models like ChatGPT can provide significant advantages in enhancing user experience, automating customer support, and facilitating various development tasks. However, as w
Details emerge on how a bad CrowdStrike update was allowed to land on Windows systems and cause over 8 billion computers to fail.
I discuss their leadership and break down the preliminary Post Incident Review document to reveal the point of failure fo
Fireside Chat On "The Future Of AI In Cybersecurity"
With Bruce Schneier (Cyptographer, author & security guru) and Bikash Barai (Co-founder, CISOPlatform & FireCompass)
>> Click Here To Read The Executive Summary.
Featured Blogs To R
Let’s talk about CrowdStrike’s quality assurance failures! Thanks to Help Net Security for publishing my opinion piece. Take a look for a more in-depth explanation of how the bad update made it to over 8 million devices and caused widespread global o
India's Data Protection Law namely The Digital Personal Data Protection Act or the DPDPA has been a topic of much discussion and debate in recent times. This Act aims to regulate the collection, storage, and processing of personal data in India, and
Let’s break down the CrowdStrike outage in non-technical terms!
Thanks for watching! Be sure to subscribe for more Cybersecurity Insights!
Follow me on LinkedIn: https://www.linkedin.com/in/matthewrosenquist/ and on my YouTube channel for more Cybersec
On July 19, 2024, a CrowdStrike update caused a global IT outage, impacting millions of Windows devices. In this article on ‘crowdstrike microsoft outage and what we learned as CISOs,’ we explore the event’s specifics and discuss key lessons for IT l
Not sure who need this resource, but Microsoft updated its Recovery Tool for the CrowdStrike issue on Windows endpoints:
Here is the link to the Microsoft Tech Community Support Site:
https://techcommunity.microsoft.com/t5/intune-customer-success/new-r
The recent CrowdStrike outage, that continues to have global implications, reinforces the fact that cybersecurity solutions help manage cyber attack risks, but can also be a source of risk. The level of system access, which is necessary to provide se
|
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
- Description:
Speaker: Hilal Ahmad Lone, CISO at Razorpay.
Moderator: Manoj Kuruvanthody, CISO & DPO at Tredence Inc.
Topic: Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
Date: Nov 22, 2024 Friday
Time: 12:00 PM ISTKey…
- Created by: Biswajit Banerjee
- Tags: aisolutions