Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Cyber Talk
Cyber Talk
Mastering shadow AI: Your guide to gaining control – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: For many organizations, artificial intelligence has become a critical...
Cyber Talk
Essential elements for a comprehensive cloud security stack – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Dotan Nahum CEO and Founder at Spectral. Digital transformation is...
Cyber Talk
Electric vehicle cyber security risks and best practices (2023) – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Micki Boland is a global cyber security warrior and evangelist with...
Cyber Talk
Mastering shadow AI: Your guide to gaining control – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: For many organizations, artificial intelligence has become a critical...
Cyber Talk
Elevating instant messaging security in 5 steps – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: In our highly interconnected and fast-paced digital world, instant...
Cyber Talk
Top strategies: How CISOs can become board-ready – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Corporate boards are actively searching for CISOs who demonstrate...
Cyber Talk
Monoculture: Could this risk affect your organization in a major way? – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau By Marco Eggerling, Field CISO, EMEA Quick introduction to monocultures As...
Cyber Talk
20 artificial intelligence podcasts to listen to right now – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau In the last eight months, AI has gone mainstream. There’s been...
Cyber Talk
How cyber and physical security can work together – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Contributed by April Miller, Senior Writer for Rehack.com. A cyber-physical security strategy...
Cyber Talk
How AI is transforming cyber security: For everyone, everywhere – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Mark Ostrowski is Head of Engineering, U.S. East, for Check Point,...
Cyber Talk
U.S. launches Cyber Trust Mark initiative to protect IoT and consumers – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: In recent years, the IoT industry has seen exponential...
Cyber Talk
How we might be able to ruin art, save society and speak to whales – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Robert Falzon is currently the Head of Engineering, Canada, within the...
Cyber Talk
5 ways you can leverage AI to defeat cyber crime – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Artificial intelligence doesn’t just bolster cyber security. It serves...
Cyber Talk
These scary AI-driven social engineering techniques should be on your radar – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Keely Wilkins is an Evangelist with the Office of the CTO...
Cyber Talk
Artificial intelligence in cyber security and healthcare – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Cindi Carter is a Field CISO, Americas, with Check Point Software...
Cyber Talk
Highly effective responses to the alarming democratization of AI – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Brian Linder is an Emerging Threats Expert and Evangelist in Check...
Cyber Talk
10 insanely effective ways to prevent sophisticated cyber attacks – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Modern cyber attacks are sophisticated, relentless and widespread. They...
Cyber Talk
AI and network security: The tricky balance between efficiency and risk (management) – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Gergana Kungalova is Security Engineer for Check Point in Bulgaria. She...
Cyber Talk
GitHub offers beta passkey opt-in (as alternative to passwords and 2FA) – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Key highlights GitHub users can now upgrade security keys...
Cyber Talk
AI in the OT/IoT environment: Deus ex machina – the good, bad & ugly – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and...
Cyber Talk
Meta’s Twitter rival Threads; user privacy strategies that can protect your account – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Up until last Thursday, OpenAI’s ChatGPT held the record...
Cyber Talk
Owning cyber resilience — whose job is it anyway? – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: The frequency and severity of cyber disruptions highlight the...
Cyber Talk
Do you know why people are really afraid of AI? Answers here. – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau In this forward-looking, tell-all interview, Mazhar Hamayun, a Check Point Regional...
Cyber Talk
The best ways to balance risks and benefits of artificial intelligence – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Artificial intelligence, once on the periphery of technological advancements,...
Cyber Talk
EU court orders Meta to change data collection practices – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: On Tuesday, a ruling from the European Union’s Court...
Cyber Talk
How artificial intelligence is revolutionizing cyber security – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: In recent years, artificial intelligence (AI) has become one...
Cyber Talk
7 ways to reduce security spend without compromising your security – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: In the current economic climate, CISOs face mounting pressure...
Cyber Talk
Is runaway artificial intelligence a real concern? – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: Industry leaders have warned that some of the AI...
Cyber Talk
The role of AI in combating cyber crime – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau In this exclusive Cyber Talk article, CEO of SEON, Tamas Kadar,...
Cyber Talk
15 incredible AI tools that can supercharge your operations – Source: www.cybertalk.org
Source: www.cybertalk.org - Author: slandau EXECUTIVE SUMMARY: An overwhelming majority of business owners, roughly 97%, anticipate...
Posts pagination
1
…
4
5
6
…
16
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025