Social Network For CISO (Chief Information Security Officers)
There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through…Continue
Why Is OSINT So Important ?
OSINT (Open-Source Intelligence) is intelligence collected from publicly available sources.
It is becoming a key resource for collecting threat…Continue
RSA Innovation Sandbox 2018, is one of the platform where information security startups can showcase their research and innovation. For the past 12 years, it is working as interface for cybersecurity companies to promote their new technology and…Continue
The Playbook Round Table was set in 3 cities - mumbai, bangalore & delhi where security heads got together to contribute in building a plan to measure an organisation's security program against 2018's application attacks…Continue
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to…Continue
Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint…Continue
Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will…Continue
Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents,…Continue