Immutable Cybersecurity Law #12“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.”3d ago23d ago2
Boards Challenged to Embrace Cybersecurity OversightIntegrating Cyber Risk into Business Risk Decisions6d ago6d ago
Are They Vulnerabilities or Undocumented Debug FeaturesThe recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices and…Mar 11Mar 11
The CISO Transformation — A Path to Business LeadershipFrom Risk Hero to Business SuperheroFeb 25Feb 25
Cybersecurity Must Reinvent or Fall BehindCybersecurity must reinvent itself or fall behind! Rinki Sethi, VP & CISO, talks about how AI is driving adaptation and discusses how…Feb 24Feb 24
Cryptocurrency Hack of $1.5 BillionThis may turn out to be the biggest #cryptocurrency hack in history! $1.5 BILLION. The details are sparse, but I am interested in the…Feb 24Feb 24
Boards Care About Cybersecurity!Hear what Rinki Sethi, VP & CISO and board member, has a lot to say about how cybersecurity will shift in 2025!Feb 20Feb 20
Microsoft Introduces a New Architecture for Quantum ComputersThe world is abuzz with Microsoft’s announcement today of the introduction of their Majorana 1 chip. It could represent a series of…Feb 20Feb 20