Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Cyber Talk
Cyber Talk
Three FIFA World Cup Scams You Should Know
Three FIFA World Cup Scams You Should Know Contributed by George Mack, Content Marketing Manager, Check...
Cyber Talk
Are we at a tipping point when it comes to data loss?
Are we at a tipping point when it comes to data loss? By Deryck Mitchelson, Field...
Cyber Talk
As a technology leader, Celebrate National Computer Security Day!
As a technology leader, Celebrate National Computer Security Day! EXECUTIVE SUMMARY: As a technology leader, you...
Cyber Talk
A Q&A with Mimi Keshani, COO and Co-Founder of Hadean
A Q&A with Mimi Keshani, COO and Co-Founder of Hadean Mimi Keshani is Hadean’s COO, driving its pioneering work in...
Cyber Talk
Canada advances cyber security via Indo-Pacific Strategy
Canada advances cyber security via Indo-Pacific Strategy EXECUTIVE SUMMARY: On Sunday, Canada launched its much-anticipated Indo-Pacific...
Cyber Talk
6 simple & straightforward Cyber Monday fraud prevention tips
6 simple & straightforward Cyber Monday fraud prevention tips EXECUTIVE SUMMARY: Starting on November 28th, Cyber...
Cyber Talk
27 expert cyber security predictions for 2023 that will help prevent attacks
27 expert cyber security predictions for 2023 that will help prevent attacks EXECUTIVE SUMMARY: In the...
Cyber Talk
One easy way to secure your Android
One easy way to secure your Android Contributed by George Mack, Content Marketing Manager, Check Point...
Cyber Talk
What is purple teaming and why is it useful?
What is purple teaming and why is it useful? EXECUTIVE SUMMARY: Networks are under attack and...
Cyber Talk
Harris Center ISO perspective: Product evaluation, board engagement & career advice
Harris Center ISO perspective: Product evaluation, board engagement & career advice In this interview, Wes Farris,...
Cyber Talk
Ransomware attack on CommonSpirit Health could affect 20 million Americans
Ransomware attack on CommonSpirit Health could affect 20 million Americans Hackers are targeting the healthcare industry....
Cyber Talk
Beware of these Black Friday scams that could spoil your holiday season
Beware of these Black Friday scams that could spoil your holiday season EXECUTIVE SUMMARY: Black Friday...
Cyber Talk
A CISO’s 100-day run to cyber success
A CISO’s 100-day run to cyber success Check Point Software’s cyber security evangelist Ashwin Ram shares...
Cyber Talk
Ransomware attack on CommonSpirit Health could affect 20 million Americans
Ransomware attack on CommonSpirit Health could affect 20 million Americans Hackers are targeting the healthcare industry....
Cyber Talk
6 ways to keep your employees safe online in 2022
6 ways to keep your employees safe online in 2022 By Anas Baig. With the increase...
Cyber Talk
Top 5 email newsletters that will make you smarter in the digital age
Top 5 email newsletters that will make you smarter in the digital age Contributed by George...
Cyber Talk
The Harris Center for Mental Health & IDD ISO shares perspectives on cyber security
The Harris Center for Mental Health & IDD ISO shares perspectives on cyber security Wes Farris...
Cyber Talk
What are eavesdropping attacks? Everything you need to know
What are eavesdropping attacks? Everything you need to know EXECUTIVE SUMMARY: Eavesdropping attacks are easy to...
Cyber Talk
How addressing “Hidden Factory” can boost the transition to “Green Factory”
How addressing “Hidden Factory” can boost the transition to “Green Factory” Antoinette Hodes is a Check...
Cyber Talk
10 secrets for successful digital transformations
10 secrets for successful digital transformations EXECUTIVE SUMMARY: Digitize to survive and thrive? Digital transformations account...
Cyber Talk
What are eavesdropping attacks? Everything you need to know
What are eavesdropping attacks? Everything you need to know EXECUTIVE SUMMARY: Eavesdropping attacks are easy to...
Cyber Talk
What are eavesdropping attacks? Everything you need to know
What are eavesdropping attacks? Everything you need to know EXECUTIVE SUMMARY: Eavesdropping attacks are easy to...
Cyber Talk
Maple Leaf Foods confirms outage due to cyber security incident
Maple Leaf Foods confirms outage due to cyber security incident EXECUTIVE SUMMARY: After discovering the breach,...
Cyber Talk
New ransomware tactics include intermittent encryption, IABs
New ransomware tactics include intermittent encryption, IABs By Zac Amos, Features Editor, Rehack.com. Ransomware is evolving with...
Cyber Talk
The trendiest buzzword in cyber security right now…
The trendiest buzzword in cyber security right now… EXECUTIVE SUMMARY: Moving to a more agile and...
Cyber Talk
Key challenges of shift-left tactics
Key challenges of shift-left tactics By Musa Nadir Sani. Software development has continued to evolve over...
Cyber Talk
New Microsoft Teams update, you can ‘assign seats’ in meetings
New Microsoft Teams update, you can ‘assign seats’ in meetings EXECUTIVE SUMMARY: Together Mode is an...
Cyber Talk
Supply chain attack on U.S. news websites
Supply chain attack on U.S. news websites EXECUTIVE SUMMARY: Due to a supply chain attack involving...
Cyber Talk
Challenges of the monolithic and distributed IoT realms
Challenges of the monolithic and distributed IoT realms Antoinette Hodes is a Check Point Solutions Architect...
Cyber Talk
For $4M, hackers buy access to corporate networks; possibly yours
For $4M, hackers buy access to corporate networks; possibly yours EXECUTIVE SUMMARY: Cyber criminals are selling...
Posts pagination
1
…
11
12
13
…
16
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025