Skip to content
Thursday, May 7, 2026
CISO Forum
  • facebook
  • instagram
  • twitter
  • youtube
  • Insights
  • View Points
  • Leadership Corner
  • Case Studies
  • News
  • Resources
    • Magazine
  • Contact
  • Events
    • The CISO Forum

Author: CISO Forum Bureau

  • Home
  • CISO Forum Bureau
  • Page 8
Employees installing pirate software on work devices despite high risk of malware, Barracuda unveils
  • Press Release

Employees installing pirate software on work devices despite high risk of malware, Barracuda unveils

  • CISO Forum Bureau
  • March 12, 2026
  • 0

Barracuda Managed XDR has detected multiple cases of users trying to install pirate or cracked versions of software onto work devices. The findings are detailed […]

SailPoint redefines identity security with new adaptive identity innovations
  • Press Release

SailPoint redefines identity security with new adaptive identity innovations

  • CISO Forum Bureau
  • March 12, 2026
  • 0

SailPoint, Inc. a leader in unified identity security for enterprises, today announced significant advancements to its AI-powered SailPoint Platform. These new capabilities are the first […]

NETSCOUT REVEALS QUALITATIVE SHIFTS IN DDOS ATTACK SOPHISTICATION, INFRASTRUCTURE CAPACITY, AND THREAT ACTOR CAPABILITIES
  • Press Release

NETSCOUT REVEALS QUALITATIVE SHIFTS IN DDOS ATTACK SOPHISTICATION, INFRASTRUCTURE CAPACITY, AND THREAT ACTOR CAPABILITIES

  • CISO Forum Bureau
  • March 12, 2026
  • 0

NETSCOUT® SYSTEMS, INC. today released its second half of the year 2025 Distributed Denial-of-Service (DDoS) Threat Intelligence Report, revealing sophisticated attacker collaboration, resilient botnets, and […]

Saviynt Taps Exclusive Networks to Accelerate Digital Identity Security Across Asia-Pacific and Japan
  • Press Release

Saviynt Taps Exclusive Networks to Accelerate Digital Identity Security Across Asia-Pacific and Japan

  • CISO Forum Bureau
  • March 12, 2026
  • 0

 Saviynt, a leading provider of cloud-native identity security and governance solutions, today announced the appointment of Exclusive Networks, a global cybersecurity go-to-market specialist, as a key […]

Check Point Launches a Secure AI Advisory Service to Help Enterprises Govern and Scale AI Transformation
  • Press Release

Check Point Launches a Secure AI Advisory Service to Help Enterprises Govern and Scale AI Transformation

  • CISO Forum Bureau
  • March 12, 2026
  • 0

Check Point Software Technologies Ltd. a pioneer and global leader in cyber security solutions, today announced a Secure AI Advisory Service, a new service designed […]

Nasscom Advisory: Strengthening Operational and Cyber Resilience Amid Evolving Middle East Situation
  • Press Release

Nasscom Advisory: Strengthening Operational and Cyber Resilience Amid Evolving Middle East Situation

  • CISO Forum Bureau
  • March 12, 2026
  • 0

In light of the evolving geopolitical situation in the Middle East, Nasscom has issued another advisory to member companies urging heightened vigilance and preparedness across […]

Top 5 Privacy Solutions Indian CISOs Are Prioritizing in 2026
  • Insights
  • Latest

Top 5 Privacy Solutions Indian CISOs Are Prioritizing in 2026

  • CISO Forum Bureau
  • March 11, 2026
  • 0

As organizations accelerate digital transformation and handle growing volumes of sensitive information, privacy protection has become a strategic priority for security leaders. Indian CISOs are […]

Top Privacy Compliance Tools Helping Enterprises Avoid Regulatory Risk
  • Press Release

Top Privacy Compliance Tools Helping Enterprises Avoid Regulatory Risk

  • CISO Forum Bureau
  • March 2, 2026
  • 0

With enforcement of the Digital Personal Data Protection Act, 2023 accelerating and global regulations like the General Data Protection Regulation setting strict benchmarks, enterprises can […]

Check Point Researchers Expose Critical Claude Code Flaws  
  • Press Release

Check Point Researchers Expose Critical Claude Code Flaws  

  • CISO Forum Bureau
  • March 2, 2026
  • 0

By Aviv Donenfeld and Oded Vanunu As organizations rapidly adopt agentic AI development tools into enterprise workflows, the trust boundaries between configuration and execution are […]

Proofpoint Collaboration Security Integrates with New Extended Plan for AWS Security Hub
  • Press Release

Proofpoint Collaboration Security Integrates with New Extended Plan for AWS Security Hub

  • CISO Forum Bureau
  • March 2, 2026
  • 0

 Proofpoint, Inc., a leading cybersecurity and compliance company, today announced that Proofpoint Collaboration Protection is now integrated with the Extended plan in AWS Security Hub, Amazon Web […]

View Points

View All
  • Latest
  • View Points

Rethinking Cybersecurity: The Shift to Identity-Centric Security

  • CISO Forum
  • April 9, 2026
  • 0
  • View Points

Cyber Resilience in Times of Crisis: How Enterprises Can Stay Secure and Operational

  • CISO Forum Bureau
  • April 8, 2026
  • 0
  • Latest
  • View Points

Backups Alone Can’t Save You: The Urgent Need for Cyber Resilience

  • CISO Forum Bureau
  • April 7, 2026
  • 0

CrowdStrike Named a Leader in the Inaugural 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies

  • CISO Forum Bureau
  • May 6, 2026
  • 0

CrowdStrike Expands Project QuiltWorks, the Cybersecurity Coalition for Securing Frontier AI Risk

  • CISO Forum Bureau
  • May 6, 2026
  • 0

Boutique phishing kit Saiga 2FA reappears with new campaigns and ‘lorem ipsum’ metadata

  • CISO Forum Bureau
  • May 6, 2026
  • 0
Security

What Boards and CXOs Should Be Asking Their Security Teams in 2026

  • CISO Forum Bureau
  • May 6, 2026
  • 0
AI

The perimeter is dead, and AI is finishing the job.

  • Jagrati Rakheja
  • May 6, 2026
  • 0

CrowdStrike Expands Project QuiltWorks, the Cybersecurity Coalition for Securing Frontier AI Risk

  • CISO Forum Bureau
  • May 6, 2026
  • 0

About CISO Forum

At CISO Forum, we are dedicated to fostering a vibrant community of cybersecurity leaders, innovators, and experts. Our mission is to empower these professionals with knowledge, resources, and connections to navigate the complex and ever-evolving landscape of cybersecurity.

Copyright © 2026