Blog Posts

CISO Guide: Surface Web, Deep Web and Dark Web - Are they different?

Posted by Y R Chandra Sekhar Varma on April 19, 2018 at 11:30am 0 Comments

There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through…


OSINT (Open Source Intelligence) : Application, Tools, Process & more

Posted by pritha on April 9, 2018 at 8:35pm 0 Comments

Why Is OSINT So Important ?

OSINT (Open-Source Intelligence) is intelligence collected from publicly available sources.

It is becoming a key resource for collecting threat…


(Sneak Peek) RSA Innovation Sandbox 2018 | Top Cyber Security Companies

Posted by Shital Singh on April 19, 2018 at 2:00pm 0 Comments

RSA Innovation Sandbox 2018, is one of the platform where information security startups can showcase their research and innovation. For the past 12 years, it is working as interface for cybersecurity companies to promote their new technology and…


(Playbook Round Table) Measuring Your Security Program Against 2018's Application Attacks

Posted by pritha on March 28, 2018 at 2:30pm 0 Comments

The Playbook Round Table was set in 3 cities - mumbai, bangalore & delhi where security heads got together to contribute in building a plan to measure an organisation's security program against 2018's application attacks…


Gartner Magic Quadrant for Security Information & Event Management 2017

Posted by Amit, CISO Platform on September 22, 2017 at 5:34pm 0 Comments

The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to…


Gartner Magic Quadrant for Enterprise Mobility Management 2017

Posted by CISO Platform on September 5, 2017 at 3:30pm 0 Comments

Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint…


eBook : Deception 2.0 for Dummies

Posted by CISO Platform on August 18, 2017 at 12:00pm 0 Comments

Deception is a very useful and effective tactic to detect and evade threats in…


Complete Guide To Log & Event Management (by Anton Chuvakin Gartner)

Posted by CISO Platform on August 18, 2017 at 12:30pm 0 Comments

Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will…


Application Threat Modeling : Types Of Threats

Posted by pritha on June 20, 2017 at 12:30pm 0 Comments

Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents,…


Playbook for DDOS Security Response

Posted by Amit, CISO Platform on May 6, 2017 at 7:30pm 0 Comments

(Author : Chandra Prakash Suryawanshi,  SVP- India & APAC at Aujas Networks Pvt. Ltd. )…


Follow Us

Contact Us


Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts