The introduction of cloud, IoT and digital transformation is increasing the attack vector. Security professionals need to expand the security coverage to protect hybrid cloud, SaaS and now Microservices and Function as a Service. The attackers are getting empowered by advancement in technologies like Artificial Intelligence and machine learning to automate the repetitive task like scanning targets and keep them free to plan subtle targeted attacks which are more successful or designing attacks that can impact at a large scale, we witnessed the WannaCry attack in 2017 Continue reading “Impact of Artificial Intelligence & Machine Learning on Cyber-security Career”
Digitization of business, the involvement of disruptive technologies to perform business functions, dissolving the boundaries between usage of personal devices to business work and evolution of technologies like Artificial Intelligence (AI), Machine Learning and Deep Learning are increasing the attack vectors. The targeted attacks using the technological innovation has increased. The recent ransomware attacks have proven capability to cripple the nationwide systems. This drives the regulators to add more complex regulatory mandates. Continue reading “Top 10 Skills Every CISO Must Have”
My profession gives me the chance of meeting and having deep discussions with CISO. Being in the profession for long enough to have CISO’s in my list of personal friends, I get to know the both sides of the coin, professional and personal.
The job of CISO is demanding and challenging. Change is the only constant thing in CISO’s day. Most of the CISO’s say that there is no fixed pattern to their day. They can plan some part of the day but the plan needs to modify to pay attention to the urgent and important issues arise due to the dynamic nature of cyber security issues. Continue reading “A Day in CISO’s Life”
The role of Chief Information Security Officer (CISO) is a relatively new and started getting organizational level recognition from the CxO community and board of directors. To establish and prove the importance of this position CISO has to shoulder multiple tasks. Continue reading “7 Books Every CISO Bookshelf Should Have”
The cybersecurity attacks are evolved from wild predator-prey chase to well-designed targeted attacks which are creating significant financial and reputational damages to businesses and government.
Identification of these attacks is becoming very difficult for the cybersecurity defense teams as the signs of these attacks are very subtle. Hacker are using disruptive technologies like Artificial Intelligence (AI) and machine learning to plan and launch these attacks. Continue reading “Artificial Intelligence and Changing Face of Cybersecurity”
Cyber security attacks have evolved from nerdy kid’s ego satisfaction acts to serious cyber crimes like ransomware. Also, the ever-growing use of mobility and IoT devices to perform business activities is spreading the attack vector drastically. Continue reading “Top 5 CISO Challenges”