Skip to content
Thursday, May 7, 2026
CISO Forum
  • facebook
  • instagram
  • twitter
  • youtube
  • Insights
  • View Points
  • Leadership Corner
  • Case Studies
  • News
  • Resources
    • Magazine
  • Contact
  • Events
    • The CISO Forum

Author: CISO Forum Bureau

  • Home
  • CISO Forum Bureau
  • Page 5
Systemic Risk Demands Operational Mastery – Not More Technology
  • Press Release

Systemic Risk Demands Operational Mastery – Not More Technology

  • CISO Forum Bureau
  • April 7, 2026
  • 0

Cyber resilience is falling behind cyber complexity. According to the World Economic Forum’s Global Cybersecurity Outlook 2025, accelerating AI adoption and deepening supply-chain interdependence are increasing systemic risk […]

Backups Alone Can’t Save You: The Urgent Need for Cyber Resilience
  • Latest
  • View Points

Backups Alone Can’t Save You: The Urgent Need for Cyber Resilience

  • CISO Forum Bureau
  • April 7, 2026
  • 0

In today’s ultra-connected digital environment, data is at the leading edge of any organization for virtually every operation. Organizations, by the very nature of today’s […]

New research reveals cyber-enabled fraud is now one of the most pervasive threats: 83% of leaders in Asia Pacific report rising AI‑related vulnerabilities, and 93% expect AI to dominate cybersecurity in 2026
  • Press Release

New research reveals cyber-enabled fraud is now one of the most pervasive threats: 83% of leaders in Asia Pacific report rising AI‑related vulnerabilities, and 93% expect AI to dominate cybersecurity in 2026

  • CISO Forum Bureau
  • April 6, 2026
  • 0

Driven by fast‑moving advances in artificial intelligence (AI) and a rapidly shifting geopolitical landscape, cyber risks are escalating around the world. According to the World […]

Claude Mythos Wake-Up Call: What AI Vulnerability Discovery Means for Cyber Defense
  • Latest
  • View Points

Claude Mythos Wake-Up Call: What AI Vulnerability Discovery Means for Cyber Defense

  • CISO Forum Bureau
  • April 6, 2026
  • 0

Last week, the industry learned that Anthropic was developing Claude Capybara, also called Mythos, a powerful new AI model with substantially improved capabilities in vulnerability […]

Why Misconfigurations Are Still the Biggest Cloud Threat
  • Latest
  • View Points

Why Misconfigurations Are Still the Biggest Cloud Threat

  • CISO Forum Bureau
  • April 3, 2026
  • 0

The use of Cloud has increased notably in the last few years. Companies are moving their data and applications to the cloud to work faster […]

GigaOm Names Check Point Software a Leader and Fast Mover in Application and API Security
  • Press Release

GigaOm Names Check Point Software a Leader and Fast Mover in Application and API Security

  • CISO Forum Bureau
  • April 2, 2026
  • 0

 Check Point® Software Technologies Ltd. a pioneer and global leader of cyber security solutions, today announced that GigaOm has named Check Point a Leader in its […]

STARDUST CHOLLIMA Likely Compromises Axiosnpm Package
  • Press Release

STARDUST CHOLLIMA Likely Compromises Axiosnpm Package

  • CISO Forum Bureau
  • April 2, 2026
  • 0

a threat actor used stolen maintainer credentials to compromise the widely used HTTP client library Axios Node Package Manager (npm) package and deploy platform-specific ZshBucket variants. CrowdStrike […]

The ROI of Hybrid Mesh Network Security: How Enterprises Are Cutting Costs and Reducing Risk in 2026
  • View Points

The ROI of Hybrid Mesh Network Security: How Enterprises Are Cutting Costs and Reducing Risk in 2026

  • CISO Forum Bureau
  • April 2, 2026
  • 0

To move fast without losing control, enterprises need a Hybrid Mesh Network Security architecture.But for CISOs and CIOs, the challenge is clear: How do you […]

Post-Quantum Security: Are Networks Ready for Quantum-Powered Threats?
  • Interview
  • Latest

Post-Quantum Security: Are Networks Ready for Quantum-Powered Threats?

  • CISO Forum Bureau
  • April 1, 2026
  • 0

The rapid growth of quantum computing in the rapidly transforming field of cybersecurity includes both immense advantages as well as complex obstacles. The cryptographic fundamentals […]

eScan Enterprise EDR Wins AV-TEST Award 2025 for Best Advanced Protection Against Ransomware and Infostealers
  • Press Release

eScan Enterprise EDR Wins AV-TEST Award 2025 for Best Advanced Protection Against Ransomware and Infostealers

  • CISO Forum Bureau
  • March 31, 2026
  • 0

eScan (MicroWorld Technologies Inc.), a global cybersecurity company, has announced that its Enterprise EDR solution has been honoured with the AV-TEST Award 2025 for Best Advanced Protection in the Corporate […]

View Points

View All
  • Latest
  • View Points

Rethinking Cybersecurity: The Shift to Identity-Centric Security

  • CISO Forum
  • April 9, 2026
  • 0
  • View Points

Cyber Resilience in Times of Crisis: How Enterprises Can Stay Secure and Operational

  • CISO Forum Bureau
  • April 8, 2026
  • 0
  • Latest
  • View Points

Backups Alone Can’t Save You: The Urgent Need for Cyber Resilience

  • CISO Forum Bureau
  • April 7, 2026
  • 0

CrowdStrike Named a Leader in the Inaugural 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies

  • CISO Forum Bureau
  • May 6, 2026
  • 0

CrowdStrike Expands Project QuiltWorks, the Cybersecurity Coalition for Securing Frontier AI Risk

  • CISO Forum Bureau
  • May 6, 2026
  • 0

Boutique phishing kit Saiga 2FA reappears with new campaigns and ‘lorem ipsum’ metadata

  • CISO Forum Bureau
  • May 6, 2026
  • 0
Security

What Boards and CXOs Should Be Asking Their Security Teams in 2026

  • CISO Forum Bureau
  • May 6, 2026
  • 0
AI

The perimeter is dead, and AI is finishing the job.

  • Jagrati Rakheja
  • May 6, 2026
  • 0

CrowdStrike Expands Project QuiltWorks, the Cybersecurity Coalition for Securing Frontier AI Risk

  • CISO Forum Bureau
  • May 6, 2026
  • 0

About CISO Forum

At CISO Forum, we are dedicated to fostering a vibrant community of cybersecurity leaders, innovators, and experts. Our mission is to empower these professionals with knowledge, resources, and connections to navigate the complex and ever-evolving landscape of cybersecurity.

Copyright © 2026