According to the IBM Security 2021 X-Force Threat Intelligence Index, in 2020 threat actors sought to profit from the unprecedented socioeconomic, business, and political challenges brought on by the COVID-19 pandemic.
In an interview with Brian Pereira, Editor-in-Chief, CISO MAG,...
Unpatched security flaws always cause a potential threat to organizations. Cybercriminals often target unpatched vulnerabilities to gain access to victims’ data and networks. Recently, cybersecurity researchers from FireEye revealed that Chinese threat actors are exploiting the vulnerabilities in Pulse...
For modern businesses, application security has become an essential concern. Every organization uses a triage of web, software, and mobile applications to serve customers and execute internal functions. However, as per the latest research from cybersecurity firm Barracuda, organizations...
It is better to be proactive in finding loopholes in the field of security. Fixing or discovering unpatched vulnerabilities or any security flaws before cybercriminals exploit them will certainly help protect critical data. Threat actors often come up with...
In Googling the “worst year in history,” you might come across the year 536. It was a year dubbed “the worst year to be alive” by a medieval scholar because of extreme weather events. This was probably due to...
This past year, I have spent much time researching and writing about ransomware attacks as well as conducting ransomware simulation exercises. I’ve come across many fascinating and even bizarre facts that I wanted to share with the CISO community.
By...
A CISO has the responsibility of building a solid relationship with their peers and staff. Building this rapport takes time and is built on mutual trust, open communication, and mostly similar goals – organizational success. The Certified Chief Information...
Compromised credentials pose severe security threats to both organizations and individuals. Attackers often leverage stolen/leaked passwords in brute force attacks to compromise user accounts. Most victims use the data breach search website Have I Been Pwned? (HIBP) to check whether...
Just a couple of weeks ago, fearing a repeat of the Colonial Pipeline-like hack, Japan had announced stringent regulations for critical services in the private sector. It had already tightened the screws in the public sector in 2018 by...
Digital advertising is one of the fastest-growing media. The entire world is hooked to cell phones and hence digital ads are often found on social media and through Google AdWords/keywords. Owing to its growing popularity, adversaries use it as...














