In the aftermath of WhatsApp’s privacy notification to users, that they will again be sharing data with Facebook, there is still a lack of clarity. I see a lot of statements from WhatsApp and general chatter regarding what data they will NOT be shar
All Posts (2220)
Intangibles now account for 90% of the S&P’s total assets and it is no accident that the core of cybersecurity has evolved to protect those aspects of the business. It is a natural progression for security to align with protecting the most important
Originally posted at Anton on Security.
Back in August, we released our first Google/Chronicle — Deloitte Security Operations Center (SOC) paper titled “Future of the SOC: Forces shaping modern security operations” (launch blog, paper PDF) and promise
I got into a very insightful debate with somebody who will remain nameless in the beginning of this post, but will perhaps be revealed later. The debate focused on the role of context in threat detection.
Specifically, it is about the role of local c
The cybersecurity field is dynamic and the roles and responsibilities are ever changing. People coming into the cybersecurity field often expect clearly defined positions and are surprised at the significant variance when looking at job descriptions
Some important aspects are changing in law enforcement, when it comes to cybercrime.
In today's video I look at the social aspects within the law enforcement community, the criminal evolution of cybercrime, and the resulting changes in behaviors that
As 2020 comes to a close, we can reflect back on some of the important cybersecurity lessons that are intertwined with the rapidly growing digital cryptocurrency economy.
A recent incident involving city surveillance video data highlights some of the criminal privacy risks of public camera and biometric programs. Without strong cybersecurity, everyone’s privacy could be undermined by cyber attackers, criminals, and m
I started reading ISO 22316:2017 about 2 months ago. My impression about Organisational Resilience was at the most BCM, Risk Management and Crisis Management put together.
After going through the standard, I realised that there are about 20 domains/ d
What should a CISO do when the executive leadership chooses to ignore critical cyber risks?
If the C-Suite and board are well informed of imperative vulnerabilities and yet choose a path to ignore security, the CISO is put in a position where they ar
It is important to look into the motivations of government orchestrated cyberattacks, such as SolarWinds, as understanding the threat-agent’s objectives can provide important insights to their long-term goals and potential next steps.
Today I discuss
The SolarWinds hack has had a significant ripple effect on the cybersecurity community, with over 18k organizations discovered to be severely vulnerable and at the mercy of nation-state hackers. The security community realized some of the biggest co
We are hosting a session and would request all interested to join us and have your security team members join us too. You could also share it with others who would find value
Workshop : How To Perform Penetration Testing On Industrial Control Systems
This report summarises the top breaches between mid – November till 15th December 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
In the wake of current ranso
The cybersecurity industry is consumed with scale and effectiveness of one of the biggest hacks in recent memory. The emerging narrative and stories are missing important pieces of the puzzle. The attackers, likely a nation-state, gained unpreceden
There is an important transition that is happening with law enforcement’s adaptation to digital currencies. Authorities are seizing billions worth of criminal’s cryptocurrency and their improving skills are proving crypto is not the safe haven that
I am honored to be among Thinkers360’s Top10 Privacy Thought Leaders and Influencers. Our digital world is filling with so much information, it represents a growing risk to the privacy and respect of people. We can have the benefits of innovative t
Even the best security organizations can be hacked! Watch my message to both the cybersecurity industry as well as those attackers that hacked FireEye and stole the RedTeam tools.
This skirmish went to the hackers, but the battle continues.
The process of digitizing industrial operations does not only relate to the traditional entities of IT infrastructure. It also plays a role in the area of the Industrial Internet of Things (IIoT), whose components used to be virtually unreachable fo
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)