Read the original article: Small businesses don’t need Cyber Security, right? Think again! (Posted on behalf of Sam Jones Cyber Essentials Consultant – Cyber Tec security) “We’re a tiny company, why would anyone want our data? It’s not like…
Category: Everyone’s Blog Posts – CISO Platform
Social networking sites are number 1 target of hackers.
Read the original article: Social networking sites are number 1 target of hackers. Social sites are the most widely used social networking site with over 2.6 billion monthly active users as of the first quarter of 2020. As a reason if which…
How mature is your Application Security Program?
Read the original article: How mature is your Application Security Program? (Posted on Behalf of Pushkal Mishra AVP IT & CISO, HDFC ERGO Health Insurance Ltd) Business applications are vital for the successful functioning of any organization. Therefore, managing their information security…
Information Security and Risk Management as a business enabler
Read the original article: Information Security and Risk Management as a business enabler (Posted on Behalf of Michalis Kamprianis Developing Security Strategies at Suse) A common problem for information security professionals, is that security is perceived as a business blocker; hindering the…
Three approaches to cyber security budgeting
Read the original article: Three approaches to cyber security budgeting (Posted on Behalf of Michalis Kamprianis Developing Security Strategies at Suse) I often get into discussions about budgets and how much a company should invest in its security program. There is no easy answer because the…
Top 5 Information Security Reports
Read the original article: Top 5 Information Security Reports (Posted On Behalf of Pushkal Mishra ,AVP IT & CISO, HDFC ERGO Health Insurance Ltd) As a security professional we always wonder about new cyber threats and how the world is…
Cover, Concealment, and Decoy – how does that apply to cybersecurity?
Read the original article: Cover, Concealment, and Decoy – how does that apply to cybersecurity? From the Military Manual, – “CCD is the use of materials and techniques to hide, blend, disguise, decoy, or disrupt the appearance of military targets…
10 Areas of Change in Cybersecurity for 2020
Read the original article: 10 Areas of Change in Cybersecurity for 2020 Cybersecurity in 2020 will be evolutionary but not revolutionary. Although there is always change and churn, much of the foundational drivers remain relatively stable. Attacks in the next…
A Path To The New Normal
Read the original article: A Path To The New Normal Original Post by David Wain, National Practice Manager — Education at Data#3 Limited Australians have a history of coming together in times of… Advertise on IT Security News. Read the original article:…
Maze Ransomware Attacks Cognizant
Read the original article: Maze Ransomware Attacks Cognizant A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position…
Maze Ransomware Attacks Cognizant
Read the original article: Maze Ransomware Attacks Cognizant A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position…
Musings on Modern Data Security
Read the original article: Musings on Modern Data Security (this is cross-posted from Anton on Security) As I am expanding my responsibilities to cover some exciting … Advertise on IT Security News. Read the original article: Musings on Modern Data Security
Data Security and Threat Models
Read the original article: Data Security and Threat Models (cross-posted from Anton on Security) This post is my admittedly imperfect attempt to “reconnect” data security… Advertise on IT Security News. Read the original article: Data Security and Threat Models
Is the world heading towards a Cyber war amid Covid-19 crisis..?
Read the original article: Is the world heading towards a Cyber war amid Covid-19 crisis..? (Posted on Behalf of Amit Ghodekar) Covid-19 has taken the world under it completely. Millions of people are infected due to this Virus and millions…
Is the world heading towards a Cyber war amid Covid-19 crisis..?
Read the original article: Is the world heading towards a Cyber war amid Covid-19 crisis..? (Posted on Behalf of Amit Ghodekar) Covid-19 has taken the world under it completely. Millions of people are infected due to this Virus and millions…
Want to stop your customers from getting duped by email spoofing? Implement DMARC now!!
Read the original article: Want to stop your customers from getting duped by email spoofing? Implement DMARC now!! It is more than a month since many of us travelled by air. But we can still remember how the security officer stopped…
Zoom in Crisis: How to Respond and Manage Product Security Incidents
Read the original article: Zoom in Crisis: How to Respond and Manage Product Security Incidents Zoom is in crisis mode, facing grave and very public concerns regarding the trust in management’s commitment for secure products, the respect for user privacy,…
Increase of the Phishing attacks in the COVID-19 situation
Read the original article: Increase of the Phishing attacks in the COVID-19 situation Novel CoronaVirus is not only posing a grave danger in the real world, but it is also posing a threat to the cyberworld. Cybercriminals are exploiting the…
[Webinar] Collaborated Cyber Defense in Pandemic Times
Read the original article: [Webinar] Collaborated Cyber Defense in Pandemic Times Key Discussion Points – – How cyber security teams should collaborate in pandemics – Your remote employees are now your 3rd parties. – Quickly achieve security by asking a…
Pivot to Telehealth Brings New Benefits and Risks
Read the original article: Pivot to Telehealth Brings New Benefits and Risks The Coronavirus pandemic is changing how people receive healthcare with a shift to more remote diagnosis options being rolled out as a first line of care. The advantages…
Coming together with safe distance and Secure
Read the original article: Coming together with safe distance and Secure Trying times like these requires organization to put their best foot forward for the safety of their employees and to enable business continuity. Work from anywhere in view of…
10 Best Practices for a Secure “Home WiFi” Network
Read the original article: 10 Best Practices for a Secure “Home WiFi” Network This blog at CISO Platform is written on behalf of Archie Jackson, Senior Director and Head of IT & IS at Incedo Inc. 10 Best Practices for…
Does Isolation Sacrifice Privacy?
Read the original article: Does Isolation Sacrifice Privacy? Would you cut & paste your intimate, private details onto Social Media for the world to see? No?… Advertise on IT Security News. Read the original article: Does Isolation Sacrifice Privacy?
10 Best Practices for a Secure “Home WiFi” Network
Read the original article: 10 Best Practices for a Secure “Home WiFi” Network This blog at CISO Platform is written on behalf of Archie Jackson, Senior Director and Head of IT & IS at Incedo Inc. 10 Best Practices for…
Work From Home Guidelines for Security (COVID19)
Read the original article: Work From Home Guidelines for Security (COVID19) I hope all of you are doing well. As you are aware that as response to Coronavirus Crisis many of us had to transition to work from home. The bad…
Sample Cyber Security Update For Management (COVID 19)
Read the original article: Sample Cyber Security Update For Management (COVID 19) During the COVID 19 crisis many organizations had to shift to Work From Home in a very short notice. During this time it is very important to keep…
Sample Email From CISO to the Board for Preparing for Black Swan Event
Read the original article: Sample Email From CISO to the Board for Preparing for Black Swan Event As the coronavirus pandemic continues to disrupt there is another threat that is rising by the day- the risk of cyberattacks. Work from home…
Webinar-Dealing with stress during Covid 19 lockdown -practical strategies and tactics of mindfulnes
Read the original article: Webinar-Dealing with stress during Covid 19 lockdown -practical strategies and tactics of mindfulnes As security professionals we understand the importance of building a resilient security program which can not only protect but also detect, respond and recover…
Webinar-Dealing with stress during Covid 19 lockdown -practical strategies and tactics of mindfulnes
As security professionals we understand the importance of building a resilient security program which can not only protect but also detect, respond and recover from a security incident. How about building a resilient mind? How well are you able to…
6 prong strategy from a CISO perspective: Learning from the cyber defense and combating COVID 19 Threat
Always thought of writing this blog, since the COVID-19 menace started literally scaring all of us. For me today is the 10th day of following social distancing, the need of the hour. The 1st week itself was very hectic from…
Helping Academia Succeed So Cybersecurity Can Thrive
The future of technology is at risk as there are not enough skilled cybersecurity workers to fulfill the demands for keeping digital technology secure, private, and safe to use. Some estimates predict there will be over 3 million unfilled positions…
[Webinar] Upskilling Your Engineers in Cybersecurity while they WFH
We recently had Webinar on “Upskilling your engineers in Cyber Security while they WFH” Key points of Discussion 1)- How attackers audit your products What lessons can be learned from them 2)- Why evaluate your engineers via a CTF You…
Cyber Security Considerations Regarding Telework or Remote Work Options in COVID 19
This blog is posted on behalf of Nilesh Gavali. As organizations prepare for possible impacts of Coronavirus Disease 2019 (COVID-19), many may consider alternate workplace options for their employees. Remote work options—or telework—require an enterprise virtual private network (VPN) solution to…
Information Security Tips when Working from Home (COVID 19)
These Information Security Tips when Working from Home are posted on behalf of Bhushan Deo, CISO for Thermax Limited. Connection & Access Avoid connecting to unsecured Wi-Fi / networks for internet. Use… Advertise on IT Security News. Read the complete…
[Panel Discussion] Reference Architecture for a Multi-Cloud Environment
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Reference Architecture for a Multi-Cloud Environment, including industry stalwart like Harshad Mengle [Future Group] (Moderator), Vijay Bharti [Happiest Minds Technologies] , Dharma Sarangi [Alshaya ], Satyavathi…
[Panel Discussion] Presenting Security to Your Board and Managing Your Stakeholders
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Presenting Security to Your Board and Managing Your Stakeholders, including industry stalwart like Vishwas Pitre [Zensar Technologies Ltd] (Moderator), Yogesh Kumar [Tata Power SED], T…
Database Encryption
Details : We have implemented Database encryption known as Transparent Data encryption.it is most critical and native solution available by leading database companies. It is implemented at file level.It helps to solve the problems like saving the data during rest.…
[Panel Discussion]Third Party Risk Management: Checklists, Frameworks & Tools
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Third Party Risk Management: Checklists, Frameworks & Tools, including industry stalwart like Sunil Varkey [HSBC] (Moderator), N D Kundu [Bank of Baroda], Jitendra Chauhan [FireCompass],…
Database Encryption
Details : We have implemented Database encryption known as Transparent Data encryption.it is most critical and native solution available by leading database companies. It is implemented at file level.It helps to solve the problems like saving the data during rest.…
[Panel Discussion]Third Party Risk Management: Checklists, Frameworks & Tools
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Third Party Risk Management: Checklists, Frameworks & Tools, including industry stalwart like Sunil Varkey [HSBC] (Moderator), N D Kundu [Bank of Baroda], Jitendra Chauhan [FireCompass],…
[Panel Discussion] Building SOC: Critical Success Factors & Vendor Evaluation Criteria
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Building SOC: Critical Success Factors & Vendor Evaluation Criteria, including industry stalwart like Vijay Kumar Verma [ Reliance Jio] (Moderator), Anand A Pande[GSTN], Somanath NG…
SACON 2020 – Evolution Of AI : Past, Present, Future (Dr. Monojit Choudhury)
Evolution Of AI : Past, Present, Future (Dr. Monojit Choudhury) Brief – This session is about AI and how AI revolutionized almost every aspect of human lives – from healthcare to agriculture, and from fashion to political campaigns. There is…
[Panel Discussion] First 90 Days Plan After Joining As a CISO
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of First 90 Days Plan After Joining As a CISO, including industry stalwart like Mansi Thapar [Jaquar Group] (Moderator), Umesh Parshetye, Amit Jaokar [NKGSB Bank], Sanil Anand Nadkarni [SLK] , Shitanshu…
Panel Discussion on the topic of First 90 Days Plan After Joining As a CISO
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of First 90 Days Plan After Joining As a CISO, including industry stalwart like Mansi Thapar (Moderator), Umesh Parshetye, Amit Jaokar, Sanil Anand Nadkarni , Shitanshu kumar Here is the video…
(Round Table) Zeroing-in on Zero Trust Architecture @ CISO PLATFORM Annual Summit 2020
The Playbook Round Table on Topic ” Zeroing-in on Zero Trust Architecture ” happened on 21st February 2020 during the 12th CISO Platform Annual Summit 2020. Security Professionals came forward to have a discussion on zero trust, frameworks and how to create…
(Round Table) Zeroing-in on Zero Trust Architecture @ CISO PLATFORM Annual Summit 2020
The Playbook Round Table on Topic ” Zeroing-in on Zero Trust Architecture ” happened on 21st February 2020 during the 12th CISO Platform Annual Summit 2020. Security Professionals came forward to have a discussion on zero trust, frameworks and how to create…
COVID 19 : Lessons Learnt (11 March 2020)
I have been involved in response to COVID19 which took the world by surprise & during last 2 months, I did several things at unprecedented speed. I am putting together this article summarizing my lessons learnt & hope these will…
COVID 19 : Lessons Learnt (11 March 2020)
I have been involved in response to COVID19 which took the world by surprise & during last 2 months, I did several things at unprecedented speed. I am putting together this article summarizing my lessons learnt & hope these will…
CISO Platform Annual Summit, 2020 Highlights
We wanted to share with you some of the amazing moments from “Annual Summit, India 2020” @ Bangalore on 21 & 22 Feb. We had over 700+ attendees including CISO and SACON attendees sharing knowledge through Taskforce Presentations, Panel Discussions Round Tables, Workshops and more making…
(Free PPTs) Top Talks @ SACON – 2020 !
Get free access to the presentations by Gregory Pickett , Nandan Nilekani, Andrea Marcelli, James Stanger, Jim Hietala, Shivangi Nadkarni, Monojit Choudhury, Srinivas Poosarla & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 600+ participants, this was the 7th edition of SACON…
(Free PPTs) Top Talks @ SACON – 2020 !
Get free access to the presentations by Gregory Pickett , Nandan Nilekani, Andrea Marcelli, James Stanger, Jim Hietala, Shivangi Nadkarni, Monojit Choudhury, Srinivas Poosarla & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 600+ participants, this was the 7th edition of SACON…
CISO Platform Annual Summit, 2020 Highlights
We wanted to share with you some of the amazing moments from “Annual Summit, India 2020” @ Bangalore on 21 & 22 Feb. We had over 700+ attendees including CISO and SACON attendees sharing knowledge through Taskforce Presentations, Panel Discussions Round Tables, Workshops and more making…
There is No Easy Fix to AI Privacy Problems
Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access…
Avast Shuts Down its Data Sales Subsidiary Due to Privacy Backlash
Avast was recently caught selling user’s web browsing data. Sensitive data like website destinations, search terms, and even what videos customers watched were collected by Avast software residing on customers’ computers. The data was repackaged and then sold by their…
More Challenges for Intel Hardware Product Security
New CPU Vulnerabilities Discovered RIDL/ZombieLoad and L1DES/CacheOut are just the latest variants of vulnerabilities discovered in Intel CPU’s that target Micro-architectural Data Sampling (MDS) weaknesses. Discovered over 7 months ago, researchers responsibly informed Intel, and kept the information… Advertise…
Time to Check and Change Your Avast Privacy Settings
Vice magazine recently reported that the Avast anti-virus company was harvesting their customer’s browsing data and selling it to other companies. This included what sites, keyword searches, YouTube videos, and other data which showcased… Advertise on IT Security News.…
Privacy Day - Yes it Matters More than You Might Think
Privacy Day promotes the fundamental principles of being able to control your personal information and to raise awareness of the risks in our digital society. The advancement and adoption of communication technology have elevated this issue to a worldwide problem. A…
Collaboration Makes Smart Cities More Secure
I am excited to join the development team for the U.S. National Institute of Standards and Technology (NIST) Smart Cities and Communities Framework (SCCF) with a focus on cybersecurity… Advertise on IT Security News. Read the complete article: Collaboration…
2020 Report on State of Breach Protection by Cynet
Cynet today announced the State of Breach Protection 2020 Report. The report reveals significant concerns that security decision-makers need to look into immediately while designing their Breach Protection Plans for 2020. Cybersecurity is one of the major concerns stated in…
Collaboration Makes Smart Cities More Secure
I am excited to join the development team for the U.S. National Institute of Standards and Technology (NIST) Smart Cities and Communities Framework (SCCF) with a focus on cybersecurity… Advertise on IT Security News. Read the complete article: Collaboration…
Cyber Security for kids – Repository
[PPT] CYBER Safety Training For Young Students:… Advertise on IT Security News. Read the complete article: Cyber Security for kids – Repository
Cyber Security for kids – Repository
The Dark Side Of The Internet : Keeping Your Family Safe… Advertise on IT Security News. Read the complete article: Cyber Security for kids – Repository
What Google Is To Most Internet Users, Shodan Is To Hackers
This blog was first published in https://www.firecompass.com/blog/shodan-dorks-to-find-exposed-it/ What Google is to most internet users, Shodan (http://www.shodan.io) is to hackers. It is a search engine for hackers to look for open or vulnerable digital assets. Shodan scans the entire internet and stores…
2019 Biggest Breaches: 2019 The “Worst Year On Record” For Breaches
According to research from Risk Based Security, the total number of breaches was up 33% over last year. That’s a whopping 5,183 data breaches for a total of 7.9 billion exposed records and in November, the research firm called 2019 the “worst year…
2019 Biggest Breaches: 2019 The “Worst Year On Record” For Breaches
According to research from Risk Based Security, the total number of breaches was up 33% over last year. That’s a whopping 5,183 data breaches for a total of 7.9 billion exposed records and in November, the research firm called 2019 the “worst year…
Digital Retaliation of Iran – Predicting the Next Evolution of Cyberwar
The United States and allies’ national cyber response may soon be tested with the latest escalating conflict in the middle east. The U.S. conducted an airstrike that killed a revered Iranian general while in Iraq. This was in retaliation to a number…