Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Cyber Talk
Cyber Talk
What is reverse tabnabbing and how can you stop it?
What is reverse tabnabbing and how can you stop it? EXECUTIVE SUMMARY: Reverse tabnabbing, also known...
Cyber Talk
Improving security velocity with agentless workloads
Improving security velocity with agentless workloads By Benny Zemmour, Group Manager Cloud Security, Check Point. Why...
Cyber Talk
How to invest in ChatGPT (and should you?)
How to invest in ChatGPT (and should you?) EXECUTIVE SUMMARY: The dawn of a new digital...
Cyber Talk
10 top cyber security vulnerabilities that you can’t ignore (2023)
10 top cyber security vulnerabilities that you can’t ignore (2023) EXECUTIVE SUMMARY: Welcome to the digital...
Cyber Talk
Microsoft Teams goes 3D: Meet your animated avatar
Microsoft Teams goes 3D: Meet your animated avatar EXECUTIVE SUMMARY: Sometimes, there are valid reasons to...
Cyber Talk
Is your organization among the 1 in 10 with malware traffic? DNS data reveals scary truth
Is your organization among the 1 in 10 with malware traffic? DNS data reveals scary truth...
Cyber Talk
2023 Power 100 honorees, highlighting women’s leadership in tech
2023 Power 100 honorees, highlighting women’s leadership in tech EXECUTIVE SUMMARY: In a world that’s constantly...
Cyber Talk
Supercharge your productivity, with five ingenious ChatGPT integrations
Supercharge your productivity, with five ingenious ChatGPT integrations EXECUTIVE SUMMARY: The powerful next-generation artificial intelligence-based tool...
Cyber Talk
Cyber security for the public sector: What you need to know
Cyber security for the public sector: What you need to know By Mazhar Hamayun, cyber security...
Cyber Talk
10 of the best places to find AI talent for your business
10 of the best places to find AI talent for your business EXECUTIVE SUMMARY: Investing in...
Cyber Talk
Increasing infrastructure security by reducing complexity
Increasing infrastructure security by reducing complexity By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Cyber...
Cyber Talk
The 2 biggest regulatory challenges for the internet of “any” thing (IoT)
The 2 biggest regulatory challenges for the internet of “any” thing (IoT) By Antoinette Hodes, a...
Cyber Talk
A shocking truth: One in five government employees, indifferent to workplace hacks
A shocking truth: One in five government employees, indifferent to workplace hacks EXECUTIVE SUMMARY: Around the...
Cyber Talk
20 password management best practices 2023
20 password management best practices 2023 EXECUTIVE SUMMARY: Hackers harvest, weaponize and sell corporate and personal...
Cyber Talk
Top insights from the most notorious ransomware attacks & attackers
Top insights from the most notorious ransomware attacks & attackers EXECUTIVE SUMMARY: Let’s out-innovate ransomware! Thanks...
Cyber Talk
Empowering women in cyber security: A CEO’s perspectives
Empowering women in cyber security: A CEO’s perspectives Meet the founder and CEO of ReynCon, Connie...
Cyber Talk
Purpose, direction and innovation: The mindset of a successful leader
Purpose, direction and innovation: The mindset of a successful leader In her role as president and...
Cyber Talk
Celebrating International Women’s Day: Creating awareness & driving change
Celebrating International Women’s Day: Creating awareness & driving change Ulrica is a VP of Product &...
Cyber Talk
Breaking barriers: Insight’s investment in women’s leadership and board readiness
Breaking barriers: Insight’s investment in women’s leadership and board readiness Megan Amdahl is Senior Vice President...
Cyber Talk
Fighting back against cyber attacks on water systems
Fighting back against cyber attacks on water systems EXECUTIVE SUMMARY: In the U.S., the government is...
Cyber Talk
CISA red-teamed a ‘large critical infrastructure’ organization, no one noticed
CISA red-teamed a ‘large critical infrastructure’ organization, no one noticed EXECUTIVE SUMMARY: In recent years, protecting...
Cyber Talk
The evolving sophistication of social engineering attacks
The evolving sophistication of social engineering attacks By Anas Baig, product manager and cyber security expert...
Cyber Talk
Check Point CEO talks emerging cyber threats & advancement strategies (2023)
Check Point CEO talks emerging cyber threats & advancement strategies (2023) EXECUTIVE SUMMARY: In this edited...
Cyber Talk
White House cyber security strategy shifts burden to providers
White House cyber security strategy shifts burden to providers EXECUTIVE SUMMARY: On Thursday, the White House...
Cyber Talk
7 likely scenarios: How cyber security will change in 2023
7 likely scenarios: How cyber security will change in 2023 By Isla Sibanda, an ethical hacker...
Cyber Talk
Phishing is what type of attack? Definition, trends and best practices
Phishing is what type of attack? Definition, trends and best practices By George Mack, Content Marketing...
Cyber Talk
Leveraging the Traffic Light Protocol helps CISOs share threat data effectively
Leveraging the Traffic Light Protocol helps CISOs share threat data effectively EXECUTIVE SUMMARY: As cyber threats...
Cyber Talk
Cracking the code: How to avoid 7 common mistakes in corporate information security
Cracking the code: How to avoid 7 common mistakes in corporate information security EXECUTIVE SUMMARY: In...
Cyber Talk
CISO learning and training: Key insights for security leaders
CISO learning and training: Key insights for security leaders Liat Doron is the Vice President of...
Cyber Talk
The war in Eastern Europe: One year later
The war in Eastern Europe: One year later EXECUTIVE SUMMARY: Russia’s invasion of Ukraine marked the...
Posts pagination
1
…
8
9
10
…
16
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025