IT-GRC solutions allow organizations to effectively manage IT and Security risks while reducing the cost and complexity of compliance. IT and Security GRC management solution are focused on leveraging near-real-time information on IT and Security ass
All Posts (2220)
Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and respond to
A distributed denial of service attack is basically when multiple sources attack a single target causing a denial of service for legit users of the targeted systems.
As the number of DDOS attempts is increasing as companies are continuing to grow th
Some of the Top security technology vendors to watch out for at the recent RSA Conference are listed as below :
1. Barkly - Provides organizations with the best defense against today’s evolving threat landscape. Barkly protects against exploits, fil
A distributed denial of service attack is basically when multiple sources attack a single target causing a denial of service for legit users of the targeted systems.
As the number of DDOS attempts is increasing as companies are continuing to grow th
Here is the list of our top 5 blogs on the DLP (Data Leakage Protection) solution, which you should go through if you are in charge of creating, implementing, and managing the DLP program in your organization.
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
Key Points of Discussion
- What is Cyber Resilience?
- Cyber Resilience Design Principles
- Cy
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
Key Points To Be Discussed
- Zero Trust Architecture
- What is ZTA???
- Status in the market
- Ga
Email Scams – Phishing / Spear phishing
· Unprotected Internet Connections – Employees when working from anywhere, they can connect to any unsecured Wi-Fi which can easily make easy way for hackers to compromise the data
· Absence of Organizational Sec
We had some very amazing sessions at CISO Platform Virtual Summit 2020, and based on community demands we are bringing this recorded session from the summit.
Key Points of Discussion
1. Data Transformation
2. Cyber Threat Landscape
3. The Dark web
Why is the Sacramento region ripe for innovation in Cybersecurity?
Come join the online Sacramento Urban Technology Lab conference where a panel including Malcolm Harkins, Kimberley Owen, George Usi, Carmen Marsh, and myself will discuss why Sac is a
Join the free webinar on Oct 28th 10am PST to listen to the panel discuss how culture can contribute or destroy cybersecurity!
I am highly excited to tell you the 'Call For Speakers' for 'Best Of The World In Security' Conference is now open
We are more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks
This webinar shares in-depth look at today’s wide range of evolving email threats, including their risks and impacts on businesses, and how machine learning and API-based inbox defense can address the gaps in the email gateway and help provide total
It simply makes no sense to call for IoT devices to be certified safe-and-secure. Before you get bent out of shape, hear me out.
Regulations are unwieldy blunt instruments, best left as a last resort. Cybersecurity regulations are not nimble, tend
Fear, one of the most powerful drivers of all time. Movies, novels, companies, even I had the unfortunate chance to hear the following phrase directed to a coworker: " I can replace you with a script and I will save money".
Automation is the new catc
This report summarises the top breaches between mid-August till 15th September 2020. The report will help you to keep track of the latest hacks and add insights to safeguard your organization by looking at the trends.
The Most Common Breach Trends
I am seeing many security vendors developing products to unify solutions into a single management interface. I fear this is just a sales tactic to gain greater market share and not intended to help the plight of CISO’s
A recent article from ComputerWe
This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech. For reference click here
This is a Cheat Sheet for Security and Risk Management for the CISSP Exam created by Comparitech. For reference click here
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)