Sponsored by Keepnet Labs
How to do 3th part risk management

7 steps to protect against Vulnerable Third-party Service Providers 

A third-party service provider is generally defined as an external person or company who provides a service or technology as part of a contract. In the IT space, a third-party service provider typically provides a technology used to store, process, and/or transmit data that enhances an organization’s operational efficiency. Risks are everywhere, particularly today as we more get digitalized, and [...]


DevSecOPs

Four Benefits of Development Security Operations

Benefits of Development Security Operations DevSecOps , short for development, security, and operations —automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery. Learning institutions are continually releasing developers into the world. However, most of these institutions only focus on teaching developers how to actualize functionalities in application [...]


5 Important Cyber Threat Intelligence Resources

This post will take you through Structured Threat Information Expression (STIX), Trusted Automated Exchange of Intelligence Information (TAXII), Oasis Open Command and Control (OpenC2), Traffic Light Protocol (TLP), and Cyberanalytics Repository by MITRE (CAR). With the knowledge of the aforementioned resources, you will be better equipped to identify threats and vulnerabilities.


Comodo Leadership - CISO

Comodo CISO

Joining Comodo Cybersecurity as CISO I am really happy to announce that I will be a part of the Comodo family. I am really excited to work closely with our founder Melih Abdulhayoglu, a new CEO Ken Levine , and our new Chief Strategy Officer Dave Karp as well as the hero's of Comodo,  Fatih Orhan, Mehmet Özer Metin, Alan Knepfer and [...]


CTI

Building a Cyber Threat Intelligence Platform in 5 steps

Cyber threat intelligence is information about a prevailing or evolving cyber threat that can be disseminated by threat intelligence partners to organizations in order to reinforce security against cyber-attack vectors , This short article will help you to leant how to build a Cyber Threat Intelligence Platform in 5 steps


Inspire Keynote Speaker Ozkaya

Inspire speaker at Arab Emerging technologies & Startups conference

I will be presenting the keynote at the Arab EmTech & Startups Conference which focuses on how organizations or Startups in the Arab World are rethink and transform not only businesses but also the life of its residents. In order to prepare for the future, transform their businesses, and gain a competitive advantage. And Making Cybersecurity major part to achieve [...]


Microsoft MVP

Awarded as Microsoft Most Valuable Professional 2021

t’s a great honor for me to be called “Microsoft Most Valuable Professional ” again. Beside being an MVP I am still a Microsoft Regional Director (community leadership award) , and to be clear no I am not back to work for Microsoft, but they’re kind enough to recognize my community contributions by way of their award programs .


GISEC Times

Our Global CISO Forum launch made it to the headlines at the GISEC Times. GISEC is the Middle East Africa's biggest cybersecurity conference with 150+ exhibiting brands, 180 speakers from our 30 countries. For m0re info : https://www.gisec.ae/  What is GISEC ? THE ARAB WORLD'S LARGEST AND MOST IMPACTFUL CYBERSECURITY EVENT Whatever sector a business operates in, cyber security matters, not just to [...]


Posted By Category: Erdal in the newsTags: Comments: 0