Social Network For CISO (Chief Information Security Officers)
Security Architecture Conference started as a simple idea to grow the Information Security builder community. The 4th edition of SACON is organized by CISO Platform, the largest social collaboration…0 Comments 0 Likes
Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint…Continue
Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will…Continue
Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents,…Continue
This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.
Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab…Continue
This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a…