Skip to content
  • Wed. Jul 6th, 2022
dynamicCISO
  • Security News
  • Products
  • Interviews
  • White Papers
  • Opinion
  • Events
    • CISO Summit 2022
Top Tags
  • Cybersecurity
  • Cyber Security
  • Malware
  • CISO
  • Ransomware
  • Cloud
  • Security

Latest Post

CISOs Must Actively Share Information Through ISACs: Team ESET Achieving Business Objectives & Cyber Resilience are Inter-connected: Dinesh Shrimali, Head Governance Risk Compliance, UPL Industry Consolidation & Platform Approach Will Determine New Security Paradigm: Vijendra Katiyar, Trend Micro Study Finds Businesses Vulnerable to Cyberattacks Targeting Software Supply Chains, CISOs Respond Apply Design Thinking to Risk Management; Keep People in the Center: Brian Barnier
Infosec Interviews Opinion Ransomware Uncategorized

CISOs Must Actively Share Information Through ISACs: Team ESET

Jun 28, 2022 Rahul Mani
Interviews Opinion Security News

Achieving Business Objectives & Cyber Resilience are Inter-connected: Dinesh Shrimali, Head Governance Risk Compliance, UPL

Jun 27, 2022 Gargi Chakrovorty
Infosec Interviews Opinion Uncategorized

Industry Consolidation & Platform Approach Will Determine New Security Paradigm: Vijendra Katiyar, Trend Micro

Jun 27, 2022 Rahul Mani
Infosec Opinion Report Security News

Study Finds Businesses Vulnerable to Cyberattacks Targeting Software Supply Chains, CISOs Respond

Jun 16, 2022 Gargi Chakrovorty
Interviews Opinion Uncategorized

Apply Design Thinking to Risk Management; Keep People in the Center: Brian Barnier

Jun 15, 2022 Rahul Mani
Infosec Interviews Opinion Ransomware Uncategorized

CISOs Must Actively Share Information Through ISACs: Team ESET

Jun 28, 2022 Rahul Mani
Interviews Opinion Security News

Achieving Business Objectives & Cyber Resilience are Inter-connected: Dinesh Shrimali, Head Governance Risk Compliance, UPL

Jun 27, 2022 Gargi Chakrovorty
Infosec Interviews Opinion Ransomware Uncategorized

CISOs Must Actively Share Information Through ISACs: Team ESET

Jun 28, 2022 Rahul Mani
Infosec Interviews

Offense and Defense Two Sides of the Same Coin: Tyler Cohen Wood

Jun 2, 2022 Smruti Gandhi

If we take a stock of the last couple of years, we’ll find Healthcare as one of the few industries,…

Feature Infosec Interviews Ransomware

Practical Playbook to Fight Ransomware Attacks

May 25, 2022 Bablu Kumar

“There will be a ransomware attack every 2 seconds by 2031 on either organizations or individuals up from 11 seconds…

Interviews Opinion

Make Cybersecurity More Immersive; Create Visibility and Observability: Vaidyanathan R Iyer, IBM

May 23, 2022 Rahul Mani

Do a general scan of news on cybersecurity, and it appears that hackers and cyber criminals are running a laboratory…

Report Security News

Barracuda Researchers Found Steady Stream Of Attempts To Exploit Two Uncovered VMware Vulnerabilities

May 23, 2022 Staff Reporter

Barracuda Networks, recently found a steady stream of attempts to exploit two recently uncovered VMware vulnerabilities while analysing the attacks…

Security News

Google Announces to Secure open-source Software (OSS) Supply Chain as Cyber-criminals Look for Vulnerabilities

May 18, 2022 Staff Reporter

Google has launched a new initiative to secure open-source software (OSS) supply chain as cyber-criminals look for vulnerabilities like Log4j…

Infosec Interviews Ransomware

Safeguarding India’s Critical Infrastructures: Connecting the Dots to Improve Security and Resilience

May 17, 2022 Ashwani Mishra

On 28th June 2017, India’s busiest port—Jawaharlal Nehru Port Trust (JNPT) was forced to shut down operations at one of…

Infosec Interviews Opinion Uncategorized

Securing Critical Infrastructure is Complex, but Not Impossible: Mathieu Gorge, VigiTrust

May 16, 2022 Rahul Mani

Immediately after the conflict between Russia and Ukraine broke out, and subsequently took shape of a full-fledged war, there was…

Infosec Interviews

Shift Focus from Detection to Prevention; SASE is the Tool for the Future: Anurag Kahol, Forcepoint India

May 12, 2022 Smruti Gandhi

When we talk of some of the imminent security threats, among others, ransomware and supply chain attacks emerge as the…

Infosec Interviews Opinion Report

Why India’s New Cybersecurity Directive Raises Many Doubts: A Critical Review

May 11, 2022 Bablu Kumar

An exponential increase in nearly all types of cybersecurity incidents has seen governments globally becoming active and taking significant steps…

Infosec Report Security News

Business Email Compromise: The 43 Billion Dollar Scam & How to Stop it

May 11, 2022 Bablu Kumar

With over 90 percent of attacks coming via email, phishing remains the most prevalent amongest all cybercrime.

Posts navigation

1 2 3 … 102

You missed

Infosec Interviews Opinion Ransomware Uncategorized

CISOs Must Actively Share Information Through ISACs: Team ESET

Jun 28, 2022 Rahul Mani
Interviews Opinion Security News

Achieving Business Objectives & Cyber Resilience are Inter-connected: Dinesh Shrimali, Head Governance Risk Compliance, UPL

Jun 27, 2022 Gargi Chakrovorty
Infosec Interviews Opinion Uncategorized

Industry Consolidation & Platform Approach Will Determine New Security Paradigm: Vijendra Katiyar, Trend Micro

Jun 27, 2022 Rahul Mani
Infosec Opinion Report Security News

Study Finds Businesses Vulnerable to Cyberattacks Targeting Software Supply Chains, CISOs Respond

Jun 16, 2022 Gargi Chakrovorty
dynamicCISO

Proudly powered by WordPress | Theme: News Talk by Themeansar.

  • Security News
  • Products
  • Interviews
  • White Papers
  • Opinion
  • Events
    • CISO Summit 2022