CISO Platform is the world's first online community solely dedicated to Senior Information Security Executives(CIO/CISO/CSO/Directors etc)
IT Trends and challenges:
World is becoming Instrumental, Interconnected and Intelligent. IT security teams in enterprises are faced with rapidly mutating threats at every possible point of entry. This is fuelled by the fast evolution of threat landscape and sea of changes in network and security architecture.
A generic definition of a crime would be an act that is in violation of the applicable laws. A crime / criminal offense may essentially hurt an individual or the community (city or a nation) at large. This concept has now been taken to the next level with rising popularity of cybercrimes. In recent years, there are several analyst reports on the increasing trends of cybercrimes. Of late; several interchangeable terms for cyber crimes such as, computer crime, cyber fraud, internet crime,…Continue
Today enterprises live in a world where natural or man made disasters can crumble a business to its knees. It is therefore critically important for these enterprises to recognise the fact that disasters are real and happen and it is essential they have a structured programme to protect the information from external and internal threats and disasters.
At a recent industry event discussing security, a question was rasised as to who needs to take ownership of security issues, the comment was made that it needs to be "someone senior enough to care, but junior enough to know what they are talking about"
This summarises a major issue in the cyber security industry. Security is a deeply complex issue, balancing threat, risk, business objectives, technology, process and people.
Senior business people tend to know about…Continue
We use security products to secure our systems and our businesses. However, the very security products we use, can themselves have vulnerabilities which can leave us susceptible to attacks. We conducted a study recently to understand the vulnerability trends in security products.Read further to know more on what we discovered this time around.
How was the research conducted?
We started off with some survey on the internet to find something closely related to…Continue
This is a fundamental principle of the data privacy jurisprudence that the organization cannot disclose personal information without having prior consent of the data subject unless it is required by law. Global data privacy laws imbibed this principle, and require the organizations, having data subject’s consent, to implement tools and techniques those assist in minimum disclosure of information only on need to know basis. Compliance with such global data privacy laws is significant for both…Continue
The Healthcare BPO market from US in areas such as medical billing/coding, Electronic Medical Records (EMR) maintenance, medical transcription and radiology services is growing at 18% annually. The US healthcare outsourcing market is estimated to be a $100 billion worth opportunity waiting to be tapped and Indian IT companies irrespective of size have been able to take advantage. Several big and medium size companies are developing domain expertise in the healthcare market and are targeting…Continue
Gone are the days when Open Source software (OSS) was only being used in educational institutions like universities, research organizations etc. Today most organizations use open source for a variety of reasons such as accelerating time-to-Market, reducing cost of development, dynamic integration etc. There are many software development organizations that work closely with their customers to determine open source strategy before making them a part of product / application development. By…Continue
Writing not only functional but secure applications is not a new concept or idea that has taken the Industry by storm. However, many Government and Commercial Organizations are still not adhering to or requiring their Organizations to adopt, implement, and build in security into the Systems Development Life Cycle process. Instead, Organizations are continuing to focus on the functional aspects of software, only to be surprised when a weakness or vulnerability in the…Continue
There is a common misconception that cyber criminals and hacktivists only target large enterprises to reap a bumper. The reality is actually very different, recently published surveys reveal that
What is evident from these reports are that SMEs are spending less time on assessing and understanding their security…Continue
Added by Colin Robbins on May 29, 2013
Posted by Subhash Singh Punjabi on May 10, 2013
Added by Ram Mohan C on June 6, 2013
Added by CISO Platform on May 20, 2013
Added by Rakshit Dhamija on May 23, 2013
June 14, 2013 all day at CISO 100 Awards
Organized By: InfoSecurity Magazine and iViz
Added by CISO Platform on June 11, 2013
Added by CISO Platform on June 18, 2013
Added by Dhananjay Rokde on June 18, 2013
Added by Suresh Krishnan on May 23, 2013
In this three-day intensive course participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO/IEC 27005…0 Comments 0 Likes
June 20, 2013 from 7:30pm to 8:30pm – Hacking an Aircraft using an Android Phone -by Hugo Teso!
CISO Platform presents an exciting opportunity to listen to Hugo Teso, who recently created global news by demonstrating how an aircraft can be compromised and remotely controlled by using an android…0 Comments 0 Likes