Skip to content
Monday, March 23, 2026
CISO Forum logo Final
  • facebook
  • instagram
  • twitter
  • youtube
  • Insights
  • View Points
  • Leadership Corner
  • Case Studies
  • News
  • Resources
    • Magazine
  • Contact
  • Events
    • The CISO Forum

Author: CISO Forum Bureau

  • Home
  • CISO Forum Bureau
  • Page 26
Phishing gangs use split and nested QR codes to evade detection in a new wave of ‘Quishing’ attacks, uncovers Barracuda
  • Press Release

Phishing gangs use split and nested QR codes to evade detection in a new wave of ‘Quishing’ attacks, uncovers Barracuda

  • CISO Forum Bureau
  • August 25, 2025
  • 0

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks. The techniques, […]

Navigating Global Challenges: Risk Management in GCC Operations
  • Insights
  • Latest

Navigating Global Challenges: Risk Management in GCC Operations

  • CISO Forum Bureau
  • August 22, 2025
  • 0

With nearly 3,000 Global Capability Centres (GCC) in India, employing 1.9 million people, these offshore hubs are today the backbone of any multinational corporate entity. […]

Debunking common myths about DDoS attacks and Protection
  • Latest

Debunking common myths about DDoS attacks and Protection

  • CISO Forum Bureau
  • August 22, 2025
  • 0

Today, enterprises heavily rely on the internet and web-based applications and services, making their continuous availability critical for business growth and long-term sustainability.  A public-facing […]

TRIAM Security Rebrands as CleanStart to Reflect Product-Led Focus on Securing the Software Supply Chain
  • Press Release

TRIAM Security Rebrands as CleanStart to Reflect Product-Led Focus on Securing the Software Supply Chain

  • CISO Forum Bureau
  • August 21, 2025
  • 0

TRIAM Security, a leading innovator in software supply chain security, today announced its rebrand to CleanStart, marking a strategic evolution from a broader security services company […]

Acronis Report Reveals India Tops Global Malware Charts as AIFuels Surge in Ransomware
  • Press Release

Acronis Report Reveals India Tops Global Malware Charts as AIFuels Surge in Ransomware

  • CISO Forum Bureau
  • August 21, 2025
  • 0

Acronis, a global leader in cybersecurity and data protection, today released the findings of the Acronis Cyberthreats Report H1 2025, detailing the most popular threat […]

Zscaler and CrowdStrike Expand Partnership to Strengthen AI-Driven Security Operations
  • Press Release

Zscaler and CrowdStrike Expand Partnership to Strengthen AI-Driven Security Operations

  • CISO Forum Bureau
  • August 21, 2025
  • 0

Zscaler, Inc., the leader in cloud security, today announced an expanded partnership between Red Canary, a Zscaler company, and strategic partner CrowdStrike to deliver enhanced protection across […]

Coveware by Veeam Reveals Q2 2025 Ransomware Surge: Social Engineering and Data Exfiltration Drive Record Payouts
  • Press Release

Coveware by Veeam Reveals Q2 2025 Ransomware Surge: Social Engineering and Data Exfiltration Drive Record Payouts

  • CISO Forum Bureau
  • August 19, 2025
  • 0

Coveware by Veeam, the leading authority in ransomware response and cyber extortion trends, today unveiled its Q2 2025 ransomware report, spotlighting a dramatic escalation in […]

Quick Heal Technologies Urges Users to Stay Vigilant as Cybercriminals Target Festive Celebrations
  • Press Release

Quick Heal Technologies Urges Users to Stay Vigilant as Cybercriminals Target Festive Celebrations

  • CISO Forum Bureau
  • August 19, 2025
  • 0

As the festive season kicks off in India, Quick Heal Technologies Limited, a global provider of cybersecurity solutions, has raised the alarm about a predictable but nonetheless […]

From Air-Gapped to Always-On: Securing Legacy OT Systems in Modern Manufacturing
  • Latest
  • Opinion

From Air-Gapped to Always-On: Securing Legacy OT Systems in Modern Manufacturing

  • CISO Forum Bureau
  • August 19, 2025
  • 0

Prior to the Industry 4.0 era, the Operational Technology (OT) ecosystem had limited cybersecurity risks as they were isolated from external networks and the internet.  […]

When Fake Feels Real: The Deepfake Evolution
  • Latest
  • Opinion

When Fake Feels Real: The Deepfake Evolution

  • CISO Forum Bureau
  • August 18, 2025
  • 0

Just a few years ago, deepfakes were little more than digital novelties—convincing in parts, clumsy in others, and often dismissed as internet humor. By 2025, […]

View Points

View All
  • View Points

Application Security from a Data Protection Compliance Perspective

  • CISO Forum
  • December 4, 2024
  • 0
  • View Points

How to secure your hybrid cloud environment?

  • CISO Forum
  • December 4, 2024
  • 0
  • View Points

Leveraging Security Operations Center (SOC) in your cyber security journey

  • CISO Forum
  • December 4, 2024
  • 0
Cybersecurity

India Cyber Threat Report 2026 Uncovers Credential Theft Attempts on Indian IT Sector; Seqrite Urges Zero-Trust Identity and DPDP Compliance for IT Resilience

  • CISO Forum Bureau
  • March 19, 2026
  • 0
DPDP

5 Leading Privacy Tools Recommended for Enterprise DPOs in the DPDP Era

  • CISO Forum Bureau
  • March 19, 2026
  • 0
Privacy Solutions

Top 5 Privacy Solutions Indian CISOs Are Prioritizing in 2026

  • CISO Forum Bureau
  • March 18, 2026
  • 0
Agentic AI

CrowdStrike and NVIDIA Just Changed How AI Agents Will Be Secured Forever

  • Jagrati Rakheja
  • March 18, 2026
  • 0
digital payments

Keep your digital payments out of trouble—here are some zippy tricks to dodge the online scam drama!

  • CISO Forum Bureau
  • March 18, 2026
  • 0
Cloud

Tamil Nadu Manufacturing Belt Sees a Steep Rise in Malware Infections in 2025, Reveals Seqrite

  • CISO Forum Bureau
  • March 17, 2026
  • 0

About CISO Forum

At CISO Forum, we are dedicated to fostering a vibrant community of cybersecurity leaders, innovators, and experts. Our mission is to empower these professionals with knowledge, resources, and connections to navigate the complex and ever-evolving landscape of cybersecurity.

Copyright © 2026