Blog Posts

Cyber Safety in Cars and Medical Devices

Posted by CISO Platform on December 19, 2014 at 2:30am 0 Comments

Cyber Safety in Cars and Medical Devices by Beau Woods, creator of IOT Security Framework. We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life…


Bitcoin Transaction Malleability: An Insight

Posted by CISO Platform on December 19, 2014 at 2:32am 0 Comments

Bitcoin Transaction Malleability, an Insight by Daniel Chechik.The bitcoin network vulnerability had disturbed the huge bitcoin network. Plenty trading websites like Silk Road,MTGox and more have been victim to "Bitcoin…


CISO Platform Annual Summit, 2014 Highlights

Posted by pritha on December 4, 2014 at 6:00pm 0 Comments

CISO Platform Annual Summit @ Mumbai, last week saw over 250+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the…


Why current SAP Security Guides Always Provide So Little Help?

Posted by Alexander Polyakov on December 3, 2014 at 7:56pm 0 Comments

This article will be about different guidelines, which can help to secure your SAP system. But nothing to worry about - this post will nevertheless remain useful and interesting, even if it does not contain information about 0-days or have no…


5 Key Benefits of Source Code Analysis

Posted by CISO Platform on December 2, 2014 at 7:00pm 0 Comments

Static Code Analysis: Binary vs. Source

Static Code Analysis is the…


Safeguard Enterprise Data during Employee Separation

Posted by Mohit Kohli on November 10, 2014 at 2:47pm 0 Comments

Organization scramble to achieve high business growth often overlooked the underlying processes which are the core of any business operation. A manual process to handle employee separation process lead devastating circumstances. Most organization…


7 Tips A CISO Should Know To Implement Endpoint Protection & IT Asset Management

Posted by pritha on October 21, 2014 at 2:58pm 0 Comments

This project mainly aims to have an enterprise wide ITAM (IT Asset Management) Systems and endpoint protection and also to maintain the hardware and software inventory. It also brought in centralized IT management and control mechanisms for…


Safeguarding Critical Data & Strong Backup

Posted by pritha on October 21, 2014 at 3:01pm 0 Comments

To protect sensitive/critical data available on users’ laptops we implemented a remote backup solution that can back up the important files and folders on the users’ laptop to a remote server. The main purpose was to safeguard the…


7 Tips For DLP Implementation

Posted by pritha on October 21, 2014 at 2:30pm 2 Comments

Kotak Mahindra Bank has initiated the DLP implementation across all business units in a phased manner and the implementation was started 6 months ago with critical business units. The solution monitors all channels, viz. Internet, Email and End…





CISO Platform Annual Summit, 2014

20-21 Nov, 2014, The Leela, Mumbai

CISO Platform Annual Summit, the largest security conference in India of exclusive Senior Security execs or decision makers brings together 200+ CISOs along with the best speakers from across the world.

Latest Activity

Vasudevan Nair is now a member of CISO Platform
CISO Platform updated an event

Best of the World Webinar: OS Security Evolution & Latest Attack Vectors - By Jacob Torrey at OS security evolution and latest attack vectors

December 17, 2014 from 10:30pm to 11:30pm
CISO Platform's 2 blog posts were featured
CISO Platform posted blog posts
Uma Sudhakar Rao is now a member of CISO Platform
CISO Platform posted videos
kuldeep is now a member of CISO Platform
Profile IconNeeraj Kumar Srivastava and Emmanuel Loffet joined CISO Platform
Dec 11

© 2014   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts