In today's digital age, the importance of safeguarding personal data has become increasingly paramount. The implementation of data protection laws, such as the Digital Personal Data Protection Act (DPDPA), represents a crucial step towards ensuring t
All Posts (2214)
As competition rises in the development of software applications, the stability and the quality of developed applications are core factors. This process is supported by quality assurance (QA) companies that offer valuable testing services that ensure
Emerging attack techniques in 2024 have profoundly impacted the cybersecurity landscape. The shift to cloud environments has made cloud security a critical focus. Attackers often exploit misconfigured cloud resources and stolen credentials to gain in
In the evolving landscape of IT infrastructure, the concept of Identity Fabric emerges as a critical solution to the challenges posed by fragmented identity management across diverse platforms. Traditionally, the push for a singular integrated identi
There is no indication that the root of Microsoft’s cybersecurity issues is being addressed. In fact, all indications are that the executive team is somewhat worried and bewildered at the diverse and numerous issues arising. After many embarrassing i
YouTube has announced that it will facilitate requests to remove AI generated content that is created to look or sound like you.
It is a nice gesture on behalf of YouTube, but the process to protect from deepfakes is not scalable. The attackers will
The Cybersecurity Vault - episode 35, with guest Mikko Hypponen.
Some of the most aggressive cyber attacks originate out of Russia. The 2022 invasion of Ukraine was a pivotal moment for nation state attacks. Mikko is close to the front lines and on
Simply put,penetration testing as a service or PTaaS is a continuous guard against cyber threats, offering an ongoing cycle of testing that traditional penetration tests don’t provide. This service combines the insights of security experts with the e
A program that involves several processes to run simultaneously without having to wait for completion of execution for previous ones is called Asynchronous programming. When data driven tasks are done sequentially then it might spoil the user experie
The Cybersecurity Vault - episode 34, with guest Chase Cunningham.
We take a hard look at when organizations make big cybersecurity mistakes, how the attackers see those as opportunities, and how they will maneuver to take advantage.
Chase’s LinkedIn
Last month, we were thrilled to have Bruce Schneier join us at the CISO Platform Summit 2024 in a fireside chat with Bikash Barai.
Bruce is one of the foremost cryptographers and a leading mind in cybersecurity. Often referred to as the "security guru
As the saying goes “Culture trumps strategy”, which very much holds true when it comes to cybersecurity! Pooja Shimpi, Sameer Gemawat, and I discuss strategies leaders can use to promote a robust security mindset and a security-first approach withi
When cybersecurity researchers break the law, destroy their reputation, and make the bug-bounty research community look bad.
TL:DR Researchers found a vulnerability in a cryptocurrency exchange. They notified the company, but then exploited the bug to
Artificial intelligence is the most powerful cutting edge technology that uses computer systems that are programmed with machine learning abilities, has capabilities of performing specific tasks that is beyond the capabilities of human mind. Human br
Reuven Cohen, who goes by the Twitter handle @ruv, has recently been experimenting with using GPT to power attack bots. He recently posted this on his Facebook page after being able to create such an attack bot very quickly:
“Autonomous AI Hack Bots
Live tomorrow June 7th 2024 on LinkedIn at noon Pacific/2pm CT — Join a brand new Voice America episode of And Security For All!
Matthew Rosenquist, CISO and Cybersecurity Strategist at Mercury Risk and Compliance, Inc., will be joining Jonathan Kimmi
Microsoft created Recall as a tool to benefit the user, but it has far more value to cybercriminals, hackers, data brokers, digital extortionists, and malicious insiders!
In today’s video, I discuss the risks and what Microsoft should do to protect us
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
- Description:
Speaker: Hilal Ahmad Lone, CISO at Razorpay.
Moderator: Manoj Kuruvanthody, CISO & DPO at Tredence Inc.
Topic: Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
Date: Nov 22, 2024 Friday
Time: 12:00 PM ISTKey…
- Created by: Biswajit Banerjee
- Tags: aisolutions