Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
Cyber Talk
Page 4
Cyber Talk
Cyber Talk
Safeguarding your organization from ChatGPT threats – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Mazhar Hamayun is a cyber security professional with over 20 years...
Cyber Talk
10 top corporate account takeover prevention strategies – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: A corporate account takeover can present significant risks for...
Cyber Talk
Africa Cyber Surge II: $40 million, 20,000 networks & 25 countries – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: The Africa Cyber Surge II operation has led to...
Cyber Talk
A third of companies hit with ransomware didn’t have to pay…Here’s how they did it – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Pete Nicoletti, Check Point Field CISO, Americas One in ten...
Cyber Talk
What is trap phishing? (2023) – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: In the complex and vast landscape of cyber security,...
Cyber Talk
The best AI security management (and the ultimate upgrades) – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Artificial intelligence has transcended its status as a buzzword...
Cyber Talk
Catch rates: 5% can cost you $1.3M in risk per week – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Keely Wilkins is an Evangelist with the Office of the CTO...
Cyber Talk
What is a ‘purple team’ in cyber security? (2023) – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: A purple team provides a critical lens through which...
Cyber Talk
CISA makes two key security recommendations to stop SIM swapping – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: According to CISA, telecommunications firms are not adequately protecting...
Cyber Talk
A CISO playbook: Elevating resilience through advanced paradigms – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Worried about the spectacular array of adversaries and threat methodologies extant...
Cyber Talk
Highly targeted phishing lures, masqueraded as legitimate Teams chats – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: More than 270 million people use Microsoft Teams every...
Cyber Talk
Zero trust and beyond – Navigating the era of generative AI challenges – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau At Check Point, I am responsible for enabling National Channel Partners...
Cyber Talk
How ransomware attacks can be a test of leadership – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Antoine Calendrier, Head of Crisis and Trust Services for Asia...
Cyber Talk
Why is the Asia Pacific region a target for cyber crime & what can be done – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Vivek Gullapalli, Field CISO, Check Point. Key insights The average...
Cyber Talk
How companies can use zero trust to secure their supply chains – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Zac Amos, Features Editor, Rehack.com Supply chain cyber attacks are on...
Cyber Talk
Mastering shadow AI: Your guide to gaining control – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: For many organizations, artificial intelligence has become a critical...
Cyber Talk
Essential elements for a comprehensive cloud security stack – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Dotan Nahum CEO and Founder at Spectral. Digital transformation is...
Cyber Talk
Electric vehicle cyber security risks and best practices (2023) – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Micki Boland is a global cyber security warrior and evangelist with...
Cyber Talk
Mastering shadow AI: Your guide to gaining control – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: For many organizations, artificial intelligence has become a critical...
Cyber Talk
Elevating instant messaging security in 5 steps – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: In our highly interconnected and fast-paced digital world, instant...
Cyber Talk
Top strategies: How CISOs can become board-ready – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Corporate boards are actively searching for CISOs who demonstrate...
Cyber Talk
Monoculture: Could this risk affect your organization in a major way? – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Marco Eggerling, Field CISO, EMEA Quick introduction to monocultures As...
Cyber Talk
20 artificial intelligence podcasts to listen to right now – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau In the last eight months, AI has gone mainstream. There’s been...
Cyber Talk
How cyber and physical security can work together – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Contributed by April Miller, Senior Writer for Rehack.com. A cyber-physical security strategy...
Cyber Talk
How AI is transforming cyber security: For everyone, everywhere – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Mark Ostrowski is Head of Engineering, U.S. East, for Check Point,...
Cyber Talk
U.S. launches Cyber Trust Mark initiative to protect IoT and consumers – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: In recent years, the IoT industry has seen exponential...
Cyber Talk
How we might be able to ruin art, save society and speak to whales – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Robert Falzon is currently the Head of Engineering, Canada, within the...
Cyber Talk
5 ways you can leverage AI to defeat cyber crime – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Artificial intelligence doesn’t just bolster cyber security. It serves...
Cyber Talk
These scary AI-driven social engineering techniques should be on your radar – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Keely Wilkins is an Evangelist with the Office of the CTO...
Cyber Talk
Artificial intelligence in cyber security and healthcare – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Cindi Carter is a Field CISO, Americas, with Check Point Software...
Posts navigation
1
…
3
4
5
…
16
Latest News
The Register Security
Fed-run LockBit site back from the dead and vows to really spill the beans on gang – Source: go.theregister.com
07/05/2024
The Register Security
Mastodon delays firm fix for link previews DDoSing sites – Source: go.theregister.com
07/05/2024
The Register Security
Consultant charged over $1.5M extortion scheme against IT giant – Source: go.theregister.com
07/05/2024
Data Breach Today
ISMG Editors: Opening Day Overview of RSA Conference 2024 – Source: www.databreachtoday.com
07/05/2024
Data Breach Today
Enterprise Technology Management: No Asset Management Silos – Source: www.databreachtoday.com
07/05/2024
Data Breach Today
The Challenges in Keeping Medical Device Software Updated – Source: www.databreachtoday.com
07/05/2024