@cissp International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course - - - - - - - - - - +also group: https://t.me/cisspgroup ————————— @alirezaghahrood
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
🔐 Introducing Diyako Secure Bow:
At DSB Co, we provide specialized and advanced cybersecurity services, helping businesses protect themselves against emerging and complex cyber threats.
💡Our Main Service:
VCISO (CISO as a Service)
DSB Co is a leader in cybersecurity, offering
VCISO (Chief Information Security Officer as a Service).This service provides organizations with an efficient solution to manage and optimize their cybersecurity strategies without the need to hire a full-time CISO.
🔧 VCISO Sub-services:
1. Cybersecurity Strategy Development and Implementation: We design and implement tailored cybersecurity strategies to meet the unique needs of your organization.
2. Risk Assessment and Management: Identifying and assessing security risks, and offering solutions to mitigate these threats.
3. Continuous Cybersecurity Monitoring and Improvement: Ongoing monitoring of activities and systems to ensure security measures are updated and optimized.
4. Employee Training and Awareness: Providing cybersecurity training to staff to reduce human-related risks.
5. Consulting on Security Technology Selection and Implementation: Guidance and support in selecting and implementing the best security tools.
🌐 Why Diyako Secure Bow
With our team of experienced professionals and consultants, we guarantee the highest level of information security and provide practical, effective solutions for managing your organization's cybersecurity.
+😇With nearly two decades of experience, a team of professionals holding internationally recognized certifications, and proven expertise in enterprise-level projects🙏❤️
-Secure Business Continuity-
2024.09.15
——————————————————
#vCISO #CISO #CyberSecurity #InformationSecurity
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_diyako-secure-bow-en-resume-activity-7240967137840840704-In_X?utm_source=share&utm_medium=member_ios
Research
Unveiling Mac Security:
A Comprehensive Exploration of Sandboxing and AppData TCC 2024.
https://github.com/guluisacat/MySlides/tree/main/BlackHatUSA2024_KCon2024
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.09.09
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Why national cybersecurity authorities would request the information in the
proposed Cyber Incident Reporting Form:
In defining which entities should be covered by a reporting mandate, NCAs may wish to consider a variety of factors. Whether an entity is part of critical infrastructure, as defined by national cybersecurity strategies or other foundational policy documents, should be a primary area of consideration. Additionally, NCAs should consider the size of the entity and their ability
to access and implement cybersecurity best practices. Determination of the scope of reporting mandates should be done in consultation with relevant industry leaders and sector-specific government regulators; governments may also benefit from broad public consultation to best scope the mandate. Governments should also send clear signals that they welcome voluntary
reporting from non-covered entities and indicate how to make such voluntary reports.
Consistent with this approach, we offer one possible definition of a covered entity: A covered entity is an entity that owns or operates an information technology (IT), operational technology (OT), other digital system, or social media account in one or more of the critical sectors defined by the published national cybersecurity strategy and has:
● “More than 50 employees,
● More than 1,000 customers, or
● Revenues greater than a nationally relevant threshold.
Beyond the definition, ensuring that every organization knows whether or not it is a covered entity is a challenge. National cybersecurity authorities, ideally in collaboration with sector-specific government entities, should implement broad awareness campaigns among business leaders and relevant trade councils to inform as many organizations as possible about their reporting obligations. Further, some organizations may ask the government to provide them with guidance about whether they are a covered entity, so NCAs should be prepared to handle such inquiries.
Special Thanks❤️😇👍🏽🙏
Cyber Threat Alliance
Institute for Security and Technology (IST)
Chainalysis
@Ciphertrace
CREST
CYBERA
Cybercrime Support Network
CyberPeace Institute
-Secure Business Continuity-
2024.08.31
——————————————————
#NSA #CISA #SANS #Incident
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_cyber-incident-reporting-activity-7235575598163648512-PlbE?utm_source=share&utm_medium=member_ios
Techbook
Sec code review
Clean Code Fundamentals:
Hands-on Guide to Understand the Fundamentals of Software Craftsmanship and Clean Code in Java 2024.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.08.26
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Red Team Tactics
Windows API for Red Team 2024.
Special Thanks❤️😇👍🏽🙏
Joas A Santos
-Secure Business Continuity-
2024.08.20
——————————————————
#CyberSecurity #APISecurity #WAF #Fortinet
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_api-protection-2024-activity-7231495563672748033-lrDV?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Cyber Criminals and attackers have become so creative in their crime type that they have started finding methods to hide data in the volatile memory of the systems. Today, in this article we are going to have a greater understanding of live memory acquisition and its forensic analysis. Live Memory acquisition is a method that is used to collect data when the system is found in an active state at the scene of the crime.Memory forensics is a division of digital forensics that generally emphasizes extracting artefacts from the volatile memory of a system that was compromised. This domain is speedily spreading in cybercrime investigations. The main reason for this is that certain artefacts are extracted from system memory only and cannot be found anywhere else. Analysing memory after capturing the ram is extremely important when it comes to collecting information on ports that were in use, the number of processes running, and the path of
certain executables on the system while carrying out the investigation.
The VolatilityFramework is one such memory analysis tool that works on command-line on Windows and Linux systems.Volatility Workbench is a GUI version of one of the same tool Volatility for analysing the artefacts from a memory dump. It is available free of cost, open-source, and runs on the Windows Operating sys.
Special Thanks❤️😇👍🏽🙏
IgniteTech Infotech
IgniteTech
@hackingarticles
-Secure Business Continuity-
2024.08.09
——————————————————
#CyberSecurity #Dumlp #Forensic #CHFI
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_memory-forensic-2024-activity-7227645320313110529-sGoK?utm_source=share&utm_medium=member_ios
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.08.02
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
CYBERSECURITY ADVISORY
Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department
Alert CodeAA21-200
Summary
This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source reporting as APT40. This advisory provides APT40’s tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help cybersecurity practitioners identify and remediate APT40 intrusions and established footholds.
APT40—aka BRONZE MOHAWK, FEVERDREAM, G0065, Gadolinium, GreenCrash, Hellsing, Kryptonite Panda, Leviathan, MUDCARP, Periscope, Temp.Periscope, and Temp.Jumper—is located in Haikou, Hainan Province, People’s Republic of China (PRC), and has been active since at least 2009. APT40 has targeted governmental organizations, companies, and universities in a wide range of industries—including biomedical, robotics, and maritime research—across the United States, Canada, Europe, the Middle East, and the South China Sea area, as well as industries included in China’s Belt and Road Initiative.
On July 19, 2021, the U.S. Department of Justice (DOJ) unsealed an indictment against four APT40 cyber actors for their illicit computer network exploitation (CNE) activities via front company Hainan Xiandun Technology Development Company (Hainan Xiandun). Hainan Xiandun employee Wu Shurong cooperated with and carried out orders from PRC Ministry of State Security (MSS) Hainan State Security Department (HSSD) intelligence officers Ding Xiaoyang, Zhu Yunmin, and Cheng Qingmin to conduct CNE. Wu’s CNE activities resulted in the theft of trade secrets, intellectual property, and other high-value information from companies and organizations in the United States and abroad, as well as from multiple foreign governments. These MSS-affiliated actors targeted victims in the following industries: academia, aerospace/aviation, biomedical, defense industrial base, education, government, healthcare, manufacturing, maritime, research institutes, and transportation (rail and shipping).
Click here for a PDF version of this report.
https://lnkd.in/dVQDgJHU
https://lnkd.in/d4fd2xtZ
Special Thanks❤️😇👍🏽🙏
CISA Alumni Group
Cybersecurity and Infrastructure Security Agency
-Secure Business Continuity-
2024.07.31
——————————————————
#CyberSecurity #MitreAttack #Chain #RiskManagement
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_tactics-techniques-and-procedures-of-indicted-activity-7224365338149154816-M6hk?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Techbook
WebApp Security
Web Application Security:
Exploitation and Countermeasures for Modern Web Applications 2024.
Special Thanks❤️😇👍🏽🙏
👇🏻
/channel/CISOasaService/15265
/channel/cissp/7549
-Secure Business Continuity-
2024.07.30
——————————————————
#CyberSecurity #webapp #OWASP #secure
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_ciso-as-a-service-activity-7223828052303085568-IsKd?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Promoting Support for Women's Menstrual Health in the Workplace: At Diyako Secure Bow we are proud to announce that, in addition to the legal leave, we have decided to grant one full day of paid leave per month for women during their menstrual cycle. This initiative aims to enhance organizational culture and support the physical and mental well-being of our female colleagues.
Why Have We Made This Decision?
Supporting Women's Health: Menstruation can be accompanied by physical and emotional discomfort.
Providing additional leave allows women to rest and take care of themselves.
Increasing Productivity: Adequate rest and attention to personal health improve overall productivity and performance.
Creating a Supportive Work Environment: With this initiative, we strive to create a supportive and understanding work environment for all our colleagues.
Call to Action
We invite other companies and organizations to consider the specific needs of their employees and promote a culture of health and well-being in the workplace. We believe that fostering such a culture benefits not only the employees but the entire organization.
Let's take a positive step together to support female colleagues and enhance organizational culture.
Best regards,
Alireza Ghahrood
Founder, vCISO
-Secure Business Continuity-
2024.07.27
——————————————————
#WomensHealth #OrganizationalSupport #CompanyCulture #CyberSecurity
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_diyakosecurebow-womenshealth-organizationalsupport-activity-7222816726768373760-8vmD?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Exploring Infostealer Malware Techniques on
Automotive Head Units:
Automotive vehicles have become exponentially more computerized in the last decade, and automakers continue to add new functionality and integrations to these systems. While most research focuses on the safety features of autonomous and semi-autonomous vehicle capabilities, there is little research regarding the data collected by these systems and whether this data is of interest to threat actors.
By exploring exposed data, pivot points, and user impact, automakers and drivers can benefit from understanding how they can better protect themselves from unwanted data exposure and potential malware.
The research conducted focuses on threat modeling a sampled Android-based infotainment system, ascertaining what data could be of interest to a financially motivated threat actor, and identifying techniques to demonstrate impact.
Special Thanks❤️😇👍🏽🙏
Daniel Mazzella, dmazzella5@gmail.com
Lee Crognale
-Secure Business Continuity-
2024.07.23
——————————————————
#CyberSecurity #Malware #Techniques #Infostealer
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_malware-techniques-2024-activity-7221395069918990336-X6bU?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
The Open Web Application Security Project (OWASP) i s a worldwide free and open com- munity focused on improving the security of application software. Our mission is to make application security "visible", so that people and organizations can make informed decisions about application security risks. Every one is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a profit charitable organization that ensures the ongoing availability and support for our work.
Special Thanks❤️😇👍🏽🙏
OWASP® Foundation
OWASP ASVS
-Secure Business Continuity-
2024.07.19
——————————————————
#CyberSecurity #OWASP #ASVS #WebSecurity
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_web-security-testing-guide-2024-activity-7219815302686007296-BpLE?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Ransomware Diaries Volume 4:
Ransomed and Exposed — The Story of RansomedVC
RansomedVC stands out as one of the most unconventional ransomware operations I’ve investigated. Its leadership strategically employs propaganda, influence campaigns, and misinformation tactics to gain fame and notoriety within the criminal community. While I may have my assessment of RansomedVC, I cannot deny the effectiveness of its tactics It also rubbed many people the wrong way, including other criminals
Special Thanks❤️😇👍🏽🙏
Analyst1
-Secure Business Continuity-
2024.07.14
——————————————————
#CyberSecurity #Ransomware #Malware #EDR #IOC
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_ransomware-2024-activity-7218258121205440512-c2wk?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
MODERN APPROACHES TO NETWORK ACCESS
SECURITY -Publication: 2024
The Cybersecurity and Infrastructure Security Agency (CISA) has frequently identified virtual private network
(VPN) solutions that have been involved in many recent high-profile incidents, both with cyber criminals and
nation-state actors. CISA has discovered over 22 Known Exploited Vulnerabilities (KEVs) related to VPN
compromise, leading to broad access to victim networks. These incidents and associated vulnerabilities
are prompting some to consider replacing their legacy VPN solutions with modern network access
solutions. The shift of more services into the cloud also points to the value of Secure Access Service Edge
(SASE) instead of a traditional security stack located in an on-premises data center. While some VPN
solutions are inherently more secure than others—and not always the cause of major cyber incidents—
current hybrid networks require adopting modern network access security solutions to help organizations
protect corporate resources. Moreover, these network access solutions provide opportunities to integrate
granular access control not inherent to traditional VPN approaches. CISA encourages a careful analysis of
how your security needs have changed in light of increased use of cloud services and leveraging any
technology updates to progress in your Zero Trust journey. Organizations that embrace these newer practices will reach an overall outcome closer to zero trust (ZT)
principles.
Special Thanks❤️😇👍🏽🙏
U.S. Department of State
Cybersecurity and Infrastructure Security Agency
@U.S. Federal Bureau of Investigation
@New Zealand’s Government Communications Security Bureau
@New Zealand’s Computer Emergency Response Team
Canadian Institute for Cybersecurity
-Secure Business Continuity-
2024.07.13
——————————————————
#CyberSecurity #CISA #NSA #CISO #DOD
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_modern-approaches-2-nas-2014-activity-7217778531131396096-hmCX?utm_source=share&utm_medium=member_ios
Tech book
Ethical Password Cracking:
Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking 2024.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.09.09
Tech book
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation 2024.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.09.01
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
CyberSentry Program:
(Mission Need)
Successful cyberattacks on our nation’s critical infrastructure can have severe consequences for our power and water supply, our bank accounts, our medical care, and other important National Critical Functions (NCFs) that underpin our national security, public safety, and economic prosperity. These kinds of attacks are becoming more common and more dangerous.
Many organizations have deployed advanced cybersecurity capabilities to safeguard their enterprises against cyber threats. More can be done to help protect the nation’s most critical infrastructure from malicious activity, including threats originating from advanced cyber actors and highly sophisticated criminal organizations that could result in severe impacts to NCFs and, by extension, everyone in the United States.Through the CyberSentry program, CISA supports national efforts to defend U.S. critical infrastructure networks, thus protecting American interests, American people, and the American way of life.
National Terrorism Advisory System
The National Terrorism Advisory System (NTAS) is designed to communicate information about terrorist threats by providing timely, detailed information to the American public. All Americans share responsibility for the nation's security, and should always be aware of the heightened risk of terrorist attack in the United States and what they should do. contains current NTAS advisories (both Alerts and Bulletins), archived copies of expired advisories, and additional information on the NTAS system.DHS replaced the color-coded alerts of the Homeland Security Advisory System (HSAS) with the National Terrorism Advisory System (NTAS) in 2011.
Special Thanks❤️😇👍🏽🙏
CISA Alumni Group
Cybersecurity and Infrastructure Security Agency
-Secure Business Continuity-
2024.08.26
——————————————————
#CISA #DOD #DHS #CyberSecurity #Vulnerability #NIST
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_cybersentry-program-2024-activity-7233794950046392320-qpw4?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
OT Security:
Operational technology (OT) is the hardware and software that monitors and controls devices, processes, and infrastructure, and is used in industrial settings.
However, as OT itself becomes increasingly connected and hosts numerous critical physical processes, it becomes a tempting target for threat actors. Processes and systems can be hacked, and threats jeopardize data integrity and potentially endanger the safety and continuity of industrial operations
OT systems control and monitor physical equipment and processes in industries like manufacturing and energy. They focus on real-time management to ensure efficiency and safety. IT systems, on the other hand, are designed to collect, process, and store data, assisting in business decision-making and communication.
Special Thanks❤️😇👍🏽🙏
CISA Alumni Group
Cybersecurity and Infrastructure Security Agency
-Secure Business Continuity-
2024.08.24
——————————————————
#OTSecurity #OT #Operationaltechnology #Energy #NetworkSecurityDesign
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_diyakosecurebow-otsecurity-ot-activity-7233115193294168064-xmVb?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Analytics
A Visual Exploration of Exploitation in the Wild 2024.
Special Thanks❤️😇👍🏽🙏
Cyentia Institute
Tenable
-Secure Business Continuity-
2024.08.19
——————————————————
#CyberSecurity #EXPLOITATION #ACKNOWLEDGMENTS #TENABLE
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_epss-exploits-2024-activity-7231188866605473792-9QgR?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Threat Research
ERIAKOS Scam Website Campaign: Screens Victims Based on Mobile and Ad Access, Likely to Evade Detection 2024.
Special Thanks❤️😇👍🏽🙏
Recorded Future
-Secure Business Continuity-
2024.08.02
——————————————————
#CyberSecurity #Attack #Phishing #Scam
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_threat-research2024-activity-7225082593606549504-VO5K?utm_source=share&utm_medium=member_ios
Tech book
Mobile Security
Malware analysis
The Android Malware Handbook:
Detection and Analysis by Human and Machine 2024.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.08.02
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Hardware Security
PKfail Research Report 2024.
https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem
Special Thanks❤️😇👍🏽🙏
BINARLY
👇🏻
/channel/CISOasaService/15270
-Secure Business Continuity-
2024.07.30
——————————————————
#CyberSecurity #Hardware #CVE
#SecureBusinessContinuity
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Hardware Security
PKfail Research Report 2024.
https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem
Special Thanks❤️😇👍🏽🙏
BINARLY
-Secure Business Continuity-
2024.07.30
——————————————————
#CyberSecurity #Hardware #CVE
#SecureBusinessContinuity
Techbook
WebApp Security
Web Application Security:
Exploitation and Countermeasures for Modern Web Applications 2024.
-Cyber Security awareness-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
2024.07.30
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Industrial Control Systems (ICS) have migrated from stand-alone isolated systems to interconnected systems that leverage existing communication platforms and protocols to increase productivity, reduce operational costs and further improve an organization’s support model. ICS are responsible for a vast amount of critical processes necessitating organizations to adequately secure their infrastructure. Creating strong boundaries between business and process control networks can reduce the number of vulnerabilities and attack pathways that an intruder may exploit to gain unauthorized access into these critical systems.
This paper provides guidance to those organizations that must secure their ICS systems and networks through a defense-in-depth approach to security, achieved through the identification of key security patterns and controls that apply to critical information security domains. The goal is a visual explanation that allows stakeholders to understand how to reduce information risk while preserving the confidentiality, integrity and availability of critical infrastructure resources in the industrial control environment.
Special Thanks❤️😇👍🏽🙏
SANS Institute
SANS Technology Institute
SANS ICS
SANS Cyber Academy
SANS Cyber Defense
-Secure Business Continuity-
2024.07.26
——————————————————
#CyberSecurity #SANS #Malware #secure
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_secure-architecture-ics-2024-activity-7222565272119873538-hekE?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Analytics
CloudFlare Trends Report
State of Application Security in 2024
Special Thanks❤️😇👍🏽🙏
Cloudflare
-Secure Business Continuity-
2024.07.23
——————————————————
#CyberSecurity #DDOS #Mitigate #ZeroTrust
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_app-security-2024-activity-7221270621811318784-6y9B?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
users can use the guide as inspiration to create strong passwords and protect them from hackers. For further information, please read the chapters What is a strong
password, Multifactor authentication and How to deal with password overload. The appendices provide examples of strong passwords.
Senior management can use the guide as inspiration to define specific password policy best practices and ensure their implementation. For further information, please read the chapters What is a strong password, Multifactor authentication, How to deal with password overload and Awareness and training.
The IT operations/supplier level can use the guide particularly in connection with the acquisition or operation of systems and services that require authentication. For further information, please read the chapters Changing all default passwords, Focus on
administrator accounts, Account lockout and login monitoring and Secure handling of passwords in systems.
IT developers/system administrators can use the guide as inspiration to ensure that user interaction with passwords as well as communication and storage of passwords is performed in a secure manner. For further information, please read the chapters Focus on administrator accounts, Account lockout and login monitoring and
Secure handling of passwords in systems.
Senior management can use the guide to familiarize themselves further with the organizational password policy. For further information, please read the chapters
Awareness and training and Organizational password policy.
Special Thanks❤️😇👍🏽🙏
EAGLE SHARK CYBER DEFENCE
-Secure Business Continuity-
2024.07.18
——————————————————
#CyberSecurity #2FA #Policy #Password
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_password-security-policy-activity-7219552091688595457-GgTU?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
AI SECURITY FRAMEWO
Artificial Intelligence (AI) has revolutionized numerous domains, transforming the way we live and work. Its algorithms and models have proven their mettle by outperforming traditional methods in various applications, from natural language processing to self-driving cars. However, as AI permeates our lives, it introduces new security risks that can have catastrophic consequences. A compromised model could cause car accidents, misdiagnose illnesses, jeopardize lives, create fake content in news or manipulate stocks, impacting serious financial crises.
To harness AI’s potential, while safeguarding against vulnerabilities, regular audits, adversarial testing, and transparent model development are essential. A practical framework for securing AI systems is crucial, ensuring that the future lies at the intersection of innovation and resilience. Join us as we explore the delicate balance between progress and security in the era of technological marvels.
Special Thanks❤️😇👍🏽🙏
Snowflake
-Secure Business Continuity-
2024.07.14
——————————————————
#CyberSecurity #AI #ML #Impact #Mitigations
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_ai-security-framework-2024-activity-7218106831649329152-bIjQ?utm_source=share&utm_medium=member_ios
#DiyakoSecureBow
————————————
CISO as A Service (vCISO)
Reversing
LogoFail: Security implications of image parsing during system boot 2023.
Special Thanks❤️😇👍🏽🙏
BlackHat
BINARLY
-Secure Business Continuity-
2024.07.12
——————————————————
#CyberSecurity #Fuzz #Fuzzer
#SecureBusinessContinuity
https://www.linkedin.com/posts/diyako-secure-bow_log0fail-2023-activity-7217417999060787200-NZ3w?utm_source=share&utm_medium=member_ios