With most countries and companies in lockdown, training and learning institutes/apps started to offer courses with minimal or no cost. I was wondering what could be the motive behind these free courses and training. I could extract two things out of
All Posts (2199)
It is more than a month since many of us travelled by air. But we can still remember how the security officer stopped us at the gate to check our tickets/boarding passes and compared it with our identification documents. The security officer matches
Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management’s commitment for secure products, the respect for user privacy, the honesty of its marketing, and the design decisions that preserve a positive user exper
Deploy Advanced EPS Solution
Enterprises should ensure that deployed End Point Security Solution in their infrastructure is enabled with Ransomware protection. They must further update anti-malware of all the end points regularly and should schedule
Novel CoronaVirus is not only posing a grave danger in the real world, but it is also posing a threat to the cyberworld. Cybercriminals are exploiting the public fears about this deadly virus using phishing attacks.
Phishing is a technique used by cyb
Key Discussion Points -
- How cyber security teams should collaborate in pandemics
- Your remote employees are now your 3rd parties.
- Quickly achieve security by asking a CISO you know
- How to ask a peer without revealing internal information
- Wha
Trying times like these requires organization to put their best foot forward for the safety of their employees and to enable business continuity. Work from anywhere in view of lock down and work from home is new normal. While some organizations had r
The Coronavirus pandemic is changing how people receive healthcare with a shift to more remote diagnosis options being rolled out as a first line of care. The advantages are many, but as an unfortunate result, healthcare data breaches will begin to
This blog at CISO Platform is written on behalf of Archie Jackson, Senior Director and Head of IT & IS at Incedo Inc.
10 Best Practices for a Secure “Home WiFi” Network
- Default Router Password: Access your home WiFi router settings by typing 192.168
The video conference company Zoom has skyrocketed to new heights and plummeted to new lows in the past few weeks. It is one of the handful of communications applications that is perfectly suited to a world beset by quarantine actions, yet has fallen
As the coronavirus pandemic continues to disrupt there is another threat that is rising by the day- the risk of cyberattacks. Work from home will suddenly change the security dynamics both from defense and offense perspective and the world is not pre
As the CEO of Zoom, Eric Yuan is certainly one of the beneficiaries of the dramatic shift to remote work that’s occurred in light of the COVID-19 pandemic. His video conferencing platform has become somewhat of a phenomenon virtually overnight, and Y
Always thought of writing this blog, since the COVID-19 menace started literally scaring all of us. For me today is the 10th day of following social distancing, the need of the hour. The 1st week itself was very hectic from work perspective. Enabling
The future of technology is at risk as there are not enough skilled cybersecurity workers to fulfill the demands for keeping digital technology secure, private, and safe to use. Some estimates predict there will be over 3 million unfilled positions
Key points of Discussion
1)- How attackers audit your products
- What lessons can be learned from them
2)- Why evaluate your engineers via a CTF
- You will understand the strengths and weaknesses of your team
- Engineers will understand attack vector
This blog is posted on behalf of Nilesh Gavali. As organizations prepare for possible impacts of Coronavirus Disease 2019 (COVID-19), many may consider alternate workplace options for their employees. Remote work options—or telework—require an enterp
These Information Security Tips when Working from Home are posted on behalf of Bhushan Deo, CISO for Thermax Limited.
Connection & Access
- Avoid connecting to unsecured Wi-Fi / networks for internet.
- Use only company provided VPN / Citrix connection
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)