In today's rapidly changing environment, threat actors are using an arsenal of new and sophisticated techniques that make attacks unrecognizable. With a plethora of products and a rapidly shifting landscape of threat and risk, cybersecurity remains
All Posts (2220)
Apple is instituting new privacy requirements, for all new applications being listed in the App Store, to enhance transparency and educate users.
It is an important step, but additional measures are needed to ensure compliance.
Cyber attackers continue to move down the compute stack with the latest variant of TrickBot now targeting firmware for malicious manipulations. This is when it gets serious. The firmware sits below the operating system and is a perfect place for ma
You know those spam calls that threaten money is owed to the IRS and if you don’t pay over-the-phone you will be arrested? How about the call that the US Immigration will deport you if you don’t pay. All annoying scams. But, highly profitable for
The holidays are a time for increased online fraud and scams. All of us need to follow the best security practices to keep our holiday from turning into a digital disaster.
Be smart. Know that the cybercriminals will attempt all manner of fraud. Be
Governments can still pursue cybercriminals and fraudsters who use cryptocurrency. China authorities have seized over 4 billion dollars worth of Bitcoin, Ethereum, and several other cryptocurrencies as part of a crackdown on the PlusToken scheme tha
We are surrounded! Smart devices are everywhere and being integrated into all facets of our lives, from toothbrushes to automobiles. Entire cities are becoming ‘smart’, as are factories, governments, global retail, freight logistics, and all nation
In our recent CISO Platform Fireside chat in association with FireCompass, we had Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, who discussed a bunch of things related to the cybersecurity practices that are gaining mo
Another vulnerability and exploit named VoltPillager has been published for Intel Corporation's SGX security technology. The attack itself is simply a hardware version of a previously discovered PlunderVolt software vulnerability where voltage to th
Criminals are offering stalking services, through the use of Moscow’s camera system, to identify and track people for $200. Customers provide a picture and the criminals will return a report of where that person has been, where they frequent, and mo
The small country of New Zealand is showing great privacy leadership by releasing a tool to help businesses determine if a cybersecurity incident is considered a Data Breach.
I may offend some people, so for those who don’t want to hear my rant, skip this video.
Recent cybersecurity predictions aren’t just wrong, they are dangerous
I am disappointed in the recent comments that Michelle Zatlyn, the co-founder and COO of Clou
A website tied to an event that quizzed people on their hacking knowledge, launched by major a security consultancy firm, is itself vulnerable to being hacked.
This incident showcases a number of important lessons for every organization that wants to
Bad news for cryptocurrency criminals!
Cryptocurrency watchers were stunned when they recently saw a billion dollars of Bitcoin being moved from a very old account that has been inactive for years.
The mystery was solved as the U.S. Dept of Justice uns
Jack Roehrig, CISO at Turnitin, and I shared insights on how to incorporate Cyber Culture as part of an organization's Cyber Strategy.
I am happy to see such cooperation across cryptocurrency exchanges to interdict these heinous crimes.
Unfortunately, in addition to the beneficial uses, crypto is also leveraged as a means to support criminal acts which undermines legitimacy and the
FireCompass is conducting a two-day Hands-on workshop on “Shifting from Pentest to Continuous Automated Red Teaming (CART)” @ Best In the world Of Security Summit - 2020
CISO Platform Virtual Conference brings together the be
A group of security vulnerability researchers, after many months of work, were able to figure out the update process and secret key used to decrypt Intel microcode updates for the Goldmont architecture product lines.
This is an important finding as it
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)