Sponsored by Keepnet Labs

Author - Erdal

GitHub CISO RoundTable

Free Opportunity to join GitHub CISO Roundtable

Join our panel discussion with security experts as we discuss best practices for building software in a zero trust environment, as well as how to secure your supply chain against sophisticated attacks like Solorigate.


CISO

7 Tips to impactfully start your CISO job

As CISO – especially in a new organization – you need to balance being a Cybersecurity guru and business acumen. Of course you will also need to start creating a cybersecurity strategy – or revise it if it exists – creating a budget , build your team but also spend time o manage the expectations of your stakeholders.. Below are [...]


Council of the European

Council of the European Union ” 12 new Reading Refences “

An introduction to Cybersecurity by Council of the European Union Cybersecurity is becoming a more crucial topic in both policy making and the every-day life of EU citizens. With October being the European Cyber Security Month the Council Library has compiled a reading list relating to personal cybersecurity as well as the importance of a strong national and international cybersecurity [...]


How to do 3th part risk management

7 steps to protect against Vulnerable Third-party Service Providers 

7  Steps to protect against Vulnerable Third-party Service Providers : There is no shortage of headlines when it comes to third-party breaches. While third-party software is becoming a common commodity in most organizations, currently there’s a lack of a formal vetting process to assess the security posture of the software and mitigate the risks they pose to a company’s core [...]


DevSecOPs

4 Benefits of Development Security Operations

Benefits of Development Security Operations DevSecOps , short for development, security, and operations —automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery. Learning institutions are continually releasing developers into the world. However, most of these institutions only focus on teaching developers how to actualize functionalities in application [...]


Comodo target last 1% of cyber threats putting South Africa firms at risk

Pinnacle’s new cyber security division has partnered with Comodo Cybersecurity to offer managed service providers a solution that blocks unknown cyber threats putting organizations at risk in South Africa. Announcing the new opportunity for South African MSPs during a webinar held in partnership with ITWeb, Joseph Jaghab, Head of Partnerships at Comodo Cybersecurity, noted: “You will never prevent 100% of [...]


Cyber Threat Intelligence Resources

This post will take you through Structured Threat Information Expression (STIX), Trusted Automated Exchange of Intelligence Information (TAXII), Oasis Open Command and Control (OpenC2), Traffic Light Protocol (TLP), and Cyberanalytics Repository by MITRE (CAR). With the knowledge of the aforementioned resources, you will be better equipped to identify threats and vulnerabilities.


Comodo Leadership - CISO

Joining Comodo as CISO (Great news for me 2021)

Joining Comodo Cybersecurity as CISO I am really happy to announce that I will be a part of the Comodo family. I am really excited to work closely with our founder Melih Abdulhayoglu, a new CEO Ken Levine , and our new Chief Strategy Officer Dave Karp as well as the hero's of Comodo,  Fatih Orhan, Mehmet Özer Metin, Alan Knepfer and [...]


CTI

Building a Cyber Threat Intelligence Platform in 5 steps

Cyber threat intelligence is information about a prevailing or evolving cyber threat that can be disseminated by threat intelligence partners to organizations in order to reinforce security against cyber-attack vectors , This short article will help you to leant how to build a Cyber Threat Intelligence Platform in 5 steps


Inspire Keynote Speaker Ozkaya

Inspire speaker at Arab Emerging technologies & Startups conference

I will be presenting the keynote at the Arab EmTech & Startups Conference which focuses on how organizations or Startups in the Arab World are rethink and transform not only businesses but also the life of its residents. In order to prepare for the future, transform their businesses, and gain a competitive advantage. And Making Cybersecurity major part to achieve [...]