pritha
  • bangalore,karnataka
  • India
  • CISO Platform

Pritha's Friends

  • Rahil Karedia
 

pritha's Page

Latest Activity

Nilesh Roy liked pritha's page Invitation To Pre-register For "SACON 2017 (Security Architecture Conference)"
Mar 16
pritha liked Gireesh Kumar's event 7th,Top 100 CISO Awards & Conference @ Pune (12-13 May)
Mar 8
pritha posted a blog post

Top 4 Resources on IoT Security from 'Task Force Blogathon'

A big thank you to our  CISO Platform IoT Security Task Force. They did a 6 hour blogathon and came up with very interesting articles for our community.If you love it, don't forget to share it !Security Vulnerabilities In Connected CarsConnected vehicle technology potentially increases driving safety and efficiency through its…See More
Mar 3
pritha's blog post was featured

CISO Guide: Enterprise Mobility Management (The Big Bang Theory)

The mobility explosion is the big bang that keeps expanding. It moved from stages like laptop, blackberry, touch based devices, tablets & more. The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. That business requirement often conflicts with those…See More
Jan 17
pritha posted a blog post

CISO Guide: Enterprise Mobility Management (The Big Bang Theory)

The mobility explosion is the big bang that keeps expanding. It moved from stages like laptop, blackberry, touch based devices, tablets & more. The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. That business requirement often conflicts with those…See More
Jan 16
pritha posted a blog post

Sneak Peek: Top Blogs, Talks & Reports From 2016

Last Year was a great year for us at CISO Platform Community & we saw some great milestones hit.Some of them are:150+ Blogs10+ Playbooks Created25+ RFPs Created10+ Events Organized470+ Security Professionals As Attendees In Events6+ Industry Expert Task Force40+ PartnershipsBelow, we have listed the Top Blogs, Talks, Reports of 2016 for those who may have missed.…See More
Jan 9
Gireesh Kumar liked pritha's page Top Talks From SACON (Security Architecture Conference) Goa, 2016 - Key Highlights
Dec 13, 2016
pritha's 2 blog posts were featured
Dec 7, 2016
pritha posted a blog post

Top 5 'Mobile Security' talks from Black Hat Conference 2016 (USA)

Our editorial team has handpicked some great talks from Black Hat Conference - one of the largest IT Security Conference in the world. Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 19th year. This six day event begins with four days of intense Trainings for security practitioners of all levels (July 30 - August 2) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more…See More
Dec 5, 2016
pritha posted a blog post

Timing attacks have never been so practical: Advance cross site search attacks (Black Hat Conference 2016)

Timing attacks have never been so practical: Advance cross site search attacksCross-site search (XS-search) is a practical timing side-channel attack that allows the extraction of sensitive information from web-services. The attack exploits inflation techniques to efficiently distinguish between search requests that yield results and requests that do not. This work focuses on the response inflation technique that increases the size of the response; as the difference in the sizes of the…See More
Dec 1, 2016
pritha posted blog posts
Nov 25, 2016
pritha's blog post was featured

Top 14 talks on 'Emerging Areas In Security Technology' from RSA Conference 2016 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2016.RSA Conference held its 25th annual event at the Moscone Center in San Francisco and brought together a record number of more than 40,000 attendees. Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars along with…See More
Nov 17, 2016
Karthik K P liked pritha's blog post How to Build Your Professional Brand?
Oct 27, 2016
Nilesh Roy liked pritha's page CISO Platform Annual Summit, 2016 Call For Speakers
Aug 17, 2016
pritha's 2 blog posts were featured
Aug 2, 2016
pritha posted blog posts
Aug 1, 2016

Profile Information

Company
CISO Platform

Pritha's Blog

Top 4 Resources on IoT Security from 'Task Force Blogathon'

Posted on March 3, 2017 at 11:36am 0 Comments

A big thank you to our  CISO Platform IoT Security Task Force. They did a 6 hour blogathon and came up with very interesting articles for our community.



If you love it, don't forget to share it !…

Continue

Cyber Insurance May Affect Incident Response Industry

Posted on February 22, 2017 at 12:00pm 0 Comments

Faced with the risk of cyberattacks, the prospect of losing data and the potential for large fines, the private sector has turned to the insurance industry to protect against losses arising from all manner of information security incidents. Research from CFC Underwriting shows a 50% growth in demand for cyberinsurance last year and the firm expects continued high demand for cyber insurance products in 2017.

The cyberinsurance industry is growing quickly as a result. Allianz estimates…

Continue

10 Things You Should Ask of Your Cyber Incident Response Tool

Posted on February 21, 2017 at 10:00am 0 Comments

In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also be more responsive than the attacker or malware can morph and be concealed. In the world of small networks (1-100 nodes), this is not a particularly oppressive challenge with the old methodologies, tools, and procedures. In midsize to large-scale…

Continue

Cyber Incident Response - The 5 Important Steps

Posted on February 18, 2017 at 12:30pm 0 Comments

This article gives us 5 fundamental steps and questions one must ask to understand the crisis of the Incident. This includes understanding the incident, the control points, plan of action, communication, business impacts.



( Read…

Continue

Comment Wall

You need to be a member of CISO Platform to add comments!

Join CISO Platform

  • No comments yet!
 
 
 

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts