Blog Posts

Executive Summary to Build Enterprise Security Architecture Governance Program

Posted by CISO Platform on April 29, 2017 at 9:00pm 0 Comments

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a…

Continue

(20 Page Guide) Critical Capabilities For Evaluating WAF - Web Application Firewall

Posted by CISO Platform on July 25, 2018 at 12:00pm 0 Comments

With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the…

Continue

Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

Posted by pritha on July 2, 2015 at 12:30am 0 Comments

Incident Response is pretty much the same, however the first few hours can be vital and only high priority actions can save the situation. Since this is a Security Breach, it is of highest priority and must be treated at highest escalation…

Continue

Top 10 talks on Cloud Security & Virtualization from RSA Conference USA 2018

Posted by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am 0 Comments

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security &…

Continue

Top 7 talks for Analytical Intelligence & Response from RSA Conference USA 2018

Posted by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am 0 Comments

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security &…

Continue

CISO Guide: Surface Web, Deep Web and Dark Web - Are they different?

Posted by Y R Chandra Sekhar Varma on April 19, 2018 at 11:30am 0 Comments

There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through…

Continue

Top 5 Enterprise Security Architecture Measurement Categories

Posted by CISO Platform on April 29, 2017 at 9:30pm 0 Comments

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab…

Continue

4 Phases of Cyber Crisis Management

Posted by CISO Platform on April 29, 2017 at 10:00pm 0 Comments

There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases. 

 …

Continue

5 Free Enterprise Mobility Management Tools

Posted by Amit, CISO Platform on April 10, 2017 at 8:00pm 0 Comments

These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:

Convertigo:

It is a privately held company…

Continue
 
 
 

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts