pritha
  • bangalore,karnataka
  • India
  • CISO Platform

Pritha's Friends

  • Aditya Raghu Vamsi Pochiraju
  • Rahil Karedia
 

pritha's Page

Latest Activity

pritha posted a blog post

Incident Response Process - Signs Of Compromise

Here are some indicators which will help you detect a compromise :Identification of same email from public domain to significant number of users or C-level employees or high value targets; encrypted attachments, password protected and zipped and protected to escape email malware filter; (put user in the reference list)End point alert / HIPS / Host based malware alerts for local script execution for the same user, raise incidentIdentify usual traffic volumes to multiple ports or IP addresses or…See More
Tuesday

Profile Information

Company
CISO Platform

Pritha's Blog

Incident Response Process - Signs Of Compromise

Posted on September 19, 2017 at 4:20pm 0 Comments

Here are some indicators which will help you detect a compromise :

  • Identification of same email from public domain to significant number of users or C-level employees or high value targets; encrypted attachments, password protected and zipped and protected to escape email malware filter; (put user in the reference list)
  • End point alert / HIPS / Host based malware alerts for local script execution for the same user, raise incident
  • Identify…
Continue

Top 8 Past Talks By Dr.Phil Polstra, Moshe Ferber, Gregory Pickett, Murray Goldschmidt & more @SACON

Posted on September 12, 2017 at 12:00pm 0 Comments

Top Past Talks By Moshe Ferber

Frequent Speaker at DEFCON, Blackhat, RSAC APJ, Royal Society London

Renowned Cloud Security Expert

1. From Zero To Secure In 1 Minute (Securing IaaS)

Conference : DEFCON 23

For complete presentation/slide : …

Continue

Technologies For Security Of BYOD

Posted on August 30, 2017 at 2:00pm 0 Comments

This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.

The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect the data and offer ability to stay connected. A reliable BYOD policy is required to help and safeguard our network. BYOD is to develop a policy that…

Continue

How to design an effective phishing simulation ?

Posted on August 28, 2017 at 2:03pm 0 Comments

This article was contributed by Sridhar Govardhan, CISA, CISM, CEH, General Manager-Cyber Security at Wipro

Phishing is a type of social engineering attack. Using phishing email, the attacker cleverly manipulates the natural human tendency to trust others and tricks the victim into act as per the instructed in the email. To be convincing, the fraudster will use…

Continue

Comment Wall

You need to be a member of CISO Platform to add comments!

Join CISO Platform

  • No comments yet!
 
 
 

 

Contact Us

Email: contact@cisoplatform.com

InfoSec Media Private Limited, First Floor, # 48, Dr DV Gundappa Road, Basavanagudi, Bangalore, Karnataka - 560004

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts