Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
CISO Strategics
Incidents & Attacks Notepad
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
The Last Watchdog
The Last Watchdog
GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them
GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them As digital...
The Last Watchdog
GUEST ESSAY: A breakout of how Google, Facebook, Instagram enable third-party snooping
GUEST ESSAY: A breakout of how Google, Facebook, Instagram enable third-party snooping More and more consumers...
The Last Watchdog
MY TAKE: Why the Matter smart home standard portends the coming of the Internet of Everything
MY TAKE: Why the Matter smart home standard portends the coming of the Internet of Everything...
The Last Watchdog
GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen
GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen Employee security awareness...
The Last Watchdog
FIRESIDE CHAT: Timely employee training, targeted testing needed to quell non-stop phishing
FIRESIDE CHAT: Timely employee training, targeted testing needed to quell non-stop phishing Humans are rather easily...
The Last Watchdog
FIRESIDE CHAT: Why ‘digital resiliency’ has arisen as the Holy Grail of IT infrastructure
FIRESIDE CHAT: Why ‘digital resiliency’ has arisen as the Holy Grail of IT infrastructure Digital resiliency...
The Last Watchdog
GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’
GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’ Cybersecurity is a...
The Last Watchdog
SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity
SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity The pace and extent of...
The Last Watchdog
NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity
NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity Network security has been...
The Last Watchdog
SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’
SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’ Finally, Uncle Sam is...
The Last Watchdog
GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy
GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy The internet has...
The Last Watchdog
GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers
GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers...
The Last Watchdog
Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’
Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’...
The Last Watchdog
Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed
Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed APIs...
The Last Watchdog
GUEST ESSAY: A breakdown of the cyber risks intrinsic to ubiquitous social media apps
GUEST ESSAY: A breakdown of the cyber risks intrinsic to ubiquitous social media apps More than...
The Last Watchdog
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace The top ransomware gangs...
The Last Watchdog
Black Hat Fireside Chat: MSSPs are well-positioned to help companies achieve cyber resiliency
Black Hat Fireside Chat: MSSPs are well-positioned to help companies achieve cyber resiliency Network security is...
The Last Watchdog
Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics
Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics The sunsetting of...
The Last Watchdog
GUEST ESSAY: How to detect if a remote job applicant is legit — or a ‘Deepfake’ candidate
GUEST ESSAY: How to detect if a remote job applicant is legit — or a ‘Deepfake’...
The Last Watchdog
GUEST ESSAY: How to secure ‘Digital Twins’ to optimize asset use, while reducing exposures
GUEST ESSAY: How to secure ‘Digital Twins’ to optimize asset use, while reducing exposures Our technological...
The Last Watchdog
GUEST ESSAY: How amplified DDoS attacks on Ukraine leverage Apple’s Remote Desktop protocol
GUEST ESSAY: How amplified DDoS attacks on Ukraine leverage Apple’s Remote Desktop protocol Cyber-attacks continue to...
The Last Watchdog
GUEST ESSAY: Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’
GUEST ESSAY: Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’ Phishing itself...
The Last Watchdog
GUEST ESSAY: The case for physically destroying — and not just wiping clean — old hard drives
GUEST ESSAY: The case for physically destroying — and not just wiping clean — old hard...
The Last Watchdog
Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs
Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs...
The Last Watchdog
Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world
Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world During...
The Last Watchdog
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterally
Fireside chat: New ‘SASE’ weapon chokes off ransomware before attack spreads laterally It’s stunning that the...
The Last Watchdog
GUEST ESSAY: New SEC rules aim to help C-levels, board members quantify cyber risks
GUEST ESSAY: New SEC rules aim to help C-levels, board members quantify cyber risks The U.S....
The Last Watchdog
GUEST ESSAY: The many benefits of infusing application security during software ‘runtime’
GUEST ESSAY: The many benefits of infusing application security during software ‘runtime’ Vulnerabilities in web applications...
The Last Watchdog
GUEST ESSAY: The post-pandemic challenges of securely managing employee endpoints
GUEST ESSAY: The post-pandemic challenges of securely managing employee endpoints The pandemic-driven remote working brought about...
Posts pagination
1
…
13
14
Latest News
CSO - Online
Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors – Source: www.csoonline.com
10/09/2025
CSO - Online
What the Salesloft Drift breaches reveal about 4th-party risk – Source: www.csoonline.com
10/09/2025
CSO - Online
6 hot cybersecurity trends – Source: www.csoonline.com
10/09/2025
securelist.com
Notes of cyber inspector: three clusters of threat in cyberspace – Source: securelist.com
10/09/2025
securityweek.com
Adobe Patches Critical ColdFusion and Commerce Vulnerabilities – Source: www.securityweek.com
10/09/2025
securityweek.com
Exposed Docker APIs Likely Exploited to Build Botnet – Source: www.securityweek.com
10/09/2025