bikash
  • Male
  • bangalore
  • India
  • iViZ Security

Bikash's Friends

  • Ravi Shankar
  • G Venkataraman
  • Suresh A Shan SAS
  • Shivkumar Pandey
  • Tushar Kanchan
  • Priyanka Aash
  • Bharat Panchal
  • K S Narayanan
  • Ashish Chandra Mishra
  • Harish Babu
  • Sachin Jain
  • Sharad Sadadekar
  • Lopa Mudra Basu
  • Sharat AIRANI
  • CISO Platform
 

bikash's Page

Profile Information

Company
iViZ Security

Bikash's Blog

Using 80/20 rule in Application Security Management

Posted on February 20, 2016 at 2:30pm 0 Comments

80/20 rule (also known as Pareto Principle) is one of the most beautiful rules which helped me to achieve as well as fail. In most of the cases where I went wrong it finally turned out to be figuring out the “right few”. This is probably one of the most elusive rules. It is easy to understand but extremely difficult to practice.

#1: Know yourself before your enemy does.

I remember in a recent conference the speaker asked the audience…

Continue

4 Areas where Artificial Intelligence Fails in Automated Penetration Testing

Posted on February 20, 2016 at 2:30pm 0 Comments

Formal Modeling and Automation is one of the things I love. I try to model everything and sometimes modeling helps and sometime it lands me in trouble. It helped me when I tried to model Penetration Testing and worked with my co-founder to design our first version of automated Penetration Testing Tool at iViZ. Where it did…

Continue

10 questions to ask before you start your Bug Bounty program…

Posted on February 20, 2016 at 2:30pm 0 Comments

Bug bounty programs are quite common these days with several of the biggest names in the industry have launched various avatars of the program. I have been asked by a few security managers and managements about should they launch a bug bounty program. Definitely bug bounty program has the advantage of crowd sourcing. However an organization should be mature and prepared enough to launch such a program. Here are some questions which shall tell you if you are prepared or not. You are ready…

Continue

Checklist To Assess The Effectiveness Of Your Vulnerability Management Program

Posted on February 20, 2016 at 2:30pm 0 Comments

From our experience of helping organizations in building their ‘Vulnerability Management’ program, we feel that one of the major challenge the security manager/management faces does not always know the reality on the grounds. Obviously the management is extremely busy and has got too many priorities. It is natural to get into managing whirlwinds. So, I wanted to define a few questions which can help you to find out how robust is your application security management program? Not just that, by…

Continue

Comment Wall

You need to be a member of CISO Platform to add comments!

Join CISO Platform

  • No comments yet!
 
 
 

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts