Blog Posts

A Review “WannaCry Ransomeware” attack took place on 12th May, 2017

Posted by Sunil Pandey on May 23, 2017 at 5:07pm 0 Comments

On 12th May, 2017 a Ransomware attack named as “WannaCry” Ransomeware, one of the largest ever cyber attacks - was reported, infecting the 19 trusts of NHS (National Health Services) in UK and infecting computers in many other…


WannaCry Ransomware - All that you need to know

Posted by Atul kumar Singh (CISO Platform) on May 22, 2017 at 5:30pm 0 Comments

A new ransomware attack, very recently has caught many organizations and users off guard. The ransomware Wannacry has infected systems across the globe and has been the topic of discussion among security professionals for quite some days…


Ransomware Response Guide

Posted by CISO Platform on May 16, 2017 at 6:30pm 0 Comments

The document is intended to be a guide for organizations faced with a ransomware infection. This guide is split into several sections, with the most critical and time-sensitive being in the initial response section. …


Top 5 Enterprise Security Architecture Measurement Categories

Posted by CISO Platform on April 29, 2017 at 9:30pm 0 Comments

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab…


Top 7 Things to do: Legal Aspects in Cyber Crisis Management (for Banks)

Posted by CISO Platform on April 29, 2017 at 10:40pm 0 Comments

Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal…


Executive Summary to Build Enterprise Security Architecture Governance Program

Posted by CISO Platform on April 29, 2017 at 9:00pm 0 Comments

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a…


4 Phases of Cyber Crisis Management

Posted by CISO Platform on April 29, 2017 at 10:00pm 0 Comments

There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases. 



5 Free Enterprise Mobility Management Tools

Posted by Amit, CISO Platform on April 10, 2017 at 8:00pm 0 Comments

These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:


It is a privately held company…


Cyber Incident Response - The 5 Important Steps

Posted by pritha on February 18, 2017 at 12:30pm 0 Comments

This article gives us 5 fundamental steps and questions one must ask to understand the crisis of the Incident. This includes understanding the incident, the control points, plan of action, communication, business impacts.…




© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts