Emotet, as stated by many threat research group claims to be a Banking Trojan; ever evolving since their entry into threat world. Although Emotet is said to be active since 2013, it was first detected in 2014. Ever since until now (August 2020) they
All Posts (2199)
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you
I am excited to be recognized with such great cybersecurity though-leaders!
Now more than ever, cybersecurity is becoming a critical pillar to the proliferation of digital technology. Trust in the devices and systems is crucial that people, companie
There has been a good deal of publicized chatter about impending cyberattacks at an unprecedented scale and how Artificial Intelligence (AI) could help stop them. Not surprisingly much of the discussion is led by AI vendors in the cybersecurity spac
[Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs ]
Introduction to IoT Phenomenon (Internet of Things)
Computing and its pervasiveness
In the last few decades more and mode devices have been connected to the internet and to ea
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
So you recall my recent post about TI matching to security telemetry like logs in near real-time? I did say that most threat intelligence (TI, also called“threat data” in t
[Posted on Behalf of Pushkal Mishra, AVP IT & CISO HDFC ERGO Health Insurance Ltd ]
There has been a wide adoption of A.I. (Artificial Intelligence) in the last few years. You might have seen them in chat rooms or on companies’ websites providing y
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
One of the most common questions I received in my nalyst years of covering SIEM and other security monitoring technologies was “what data sources to integrate into my SIEM
[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc]
AI is a huge ecosystem of tools, languages, frameworks with functions ranging from data ingestion, data pre-processing, modeling, model evaluation, integration, vi
[Posted on Behalf of Gary Hayslip, CISO Softbank Investment advisor ]
In my 20+ years as an information technology and cybersecurity professional, I have had the privilege to work with and mentor some amazing people. I have learned as a CIO and as
[Posted on Behalf of Subbu Iyer, Founder and chief Designer Hreemm]
In 2015 and 2017, PETER WEILL AND STEPHANIE L. WOERNER surveyed several hundred enterprises, examining both the capabilities needed for transformation and the impacts on performance.
An Artificial Intelligence (AI) system is only as good as its training. For AI Machine Learning (ML) and Deep Learning (DL) frameworks, the training data sets are a crucial element that defines how the system will operate. Feed it skewed or biased in
This blog was originally contributed by Apoorv Saxena, technical team, FireCompass over here
This session gives a brief overview about where does Data Privacy come from, What is GDPR, GDPR Key Principles, Data Subject Rights, Processor Liabilities, DPO Need, Global Risk at a Glance, What are the common Threats, Risk Based Methodology, Data P
Bugcrowd has released some interesting survey data that provides insights into the white-hat vulnerability researcher community.
Of note, most researchers were male (94%) and make less than $25k per year finding vulnerabilities. A vast majority were m
This is a cross post from original source at FireCompass here
Turkey may be the first customer for the Kargu series of weaponized suicide drones specifically developed for military use. These semi-autonomous devices have been in development since 2017 and will eventually be upgraded to operate collectively as
As a SaaS GRC pioneer, We have been hearing since this black swan event happened, that world wants to allow the topmost secure role in the company CISO also goes vCISO route.
2 things - Great deal of advantage
- COST- Instead spending 250k on a CISO, co
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
Biometrics, while an element of data security, is a unique attribute that should be treated in an extraordinary fashion.
Password
Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protect
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)