All Blog Posts (564)

Top 8 talks on 'Emerging Technologies' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and…

Continue

Added by pritha on April 14, 2017 at 5:00pm — No Comments

Top 8 talks on 'Emerging Technologies' from RSA Conference 2017 (USA)

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top Emerging Areas In Security Technology talks at RSA Conference 2017.

RSA Conference held its event at the Moscone Center in San Francisco and…

Continue

Added by Shreya Shree on April 14, 2017 at 4:30pm — No Comments

Applied Cognitive Security: Complementing the Security Analyst

Applied Cognitive Security: Complementing the Security Analyst (RSA Conference 2017)

Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights…

Continue

Added by Shreya Shree on April 14, 2017 at 12:36pm — No Comments

Automated Prevention of Ransomware with Machine Learning and GPOs

Automated Prevention of Ransomware with Machine Learning and GPOs (RSA Conference 2017)

This talk will highlight a signature-less method to detect malicious behavior before the delivery of the ransomware payload can infect the machine. The ML-driven detection method is coupled with the automated generation of a Group Policy Object and in this way we demonstrate an automated way to take action and create…

Continue

Added by Shreya Shree on April 14, 2017 at 12:33pm — No Comments

Confusion and Deception: New Tools for Data Protection

Confusion and Deception:  New Tools for Data Protection (RSA Conference 2017)

Cyberthreats are assymetric risks: corporate defenders must secure and detect everything, but the attacker needs to exploit only once. As petabytes of data traverse the ecosystem, legacy data protection methods leave many gaps. By looking through the adversary’s eyes, you can create subterfuges, delay attack progress or reduce…

Continue

Added by Shreya Shree on April 14, 2017 at 12:29pm — No Comments

Applied Machine Learning: Defeating Modern Malicious Documents

Applied Machine Learning: Defeating Modern Malicious Documents (RSA Conference 2017)

A common tactic adopted by attackers for initial exploitation is the use of malicious code embedded in Microsoft Office documents. This attack vector is not new, but attackers are still having success. This session will dive into the details of these techniques, introduce some machine learning approaches to analyze and…

Continue

Added by Shreya Shree on April 14, 2017 at 12:11pm — No Comments

Advances in Cloud-Scale Machine Learning for Cyber-Defense

Advances in Cloud-Scale Machine Learning for Cyber-Defense (RSA Conference 2017)

Picking an attacker’s signals out of billions of log events in near real time from petabyte scale storage is a daunting task, but Microsoft has been using security data science at cloud scale to successfully disrupt attackers. This session will present the latest frameworks, techniques and the unconventional machine-learning…

Continue

Added by Shreya Shree on April 14, 2017 at 12:06pm — No Comments

Hello false flags! The art of deception in targeted attack distribution

Hello false flags! The art of deception in targeted attack distribution (RSA Conference 2017)

When it comes to targeted attacks, everyone is obsessed with attribution. It’s a near impossible question to answer. Attackers often try to muddy the waters through deception tactics like false flags. This talk will draw on unpublished research to provide real-world examples of false flag operations and explain…

Continue

Added by Shreya Shree on April 14, 2017 at 12:00pm — No Comments

Ridge-based Profiled Differential Power Analysis

Ridge-based Profiled Differential Power Analysis (RSA  Conference 2017)

Ridge-based differential power analysis techniques and side-channel attacks on intermediate states with no partial key guessing are discussed. Topic 1: Ridge-Based Profiled Differential Power Analysis Authors: Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu and Chi Zhang Topic 2: My Traces Learn What You Did in the…

Continue

Added by Shreya Shree on April 14, 2017 at 11:30am — No Comments

Machine Learning: Cybersecurity Boon or Boondoggle?

Machine Learning: Cybersecurity Boon or Boondoggle? (RSA Conference 2017)

Machine learning (ML) and artificial intelligence (AI) are the latest “shiny new things” in cybersecurity technology but while ML and AI hold great promise for automating routine processes and tasks and accelerating threat detection, they are not a panacea. This session will demonstrate what they can and can’t do in a cybersecurity…

Continue

Added by Shreya Shree on April 14, 2017 at 11:00am — No Comments

5 Free Enterprise Mobility Management Tools

These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:



Convertigo:

It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute its cloud based or on premise Mobile Application Development Platform (MADP).

Type: Open-Source

Features…

Continue

Added by Amit, CISO Platform on April 10, 2017 at 8:14pm — No Comments

How To Build Your Mobile Security Strategy

The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own.

While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in…

Continue

Added by Gireesh Kumar on April 10, 2017 at 8:00pm — No Comments

5 Free Enterprise Mobility Management Tools

These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:

Convertigo:

It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute its cloud based or on premise Mobile Application Development Platform (MADP).

Type: Open-Source

Features…

Continue

Added by Amit, CISO Platform on April 10, 2017 at 8:00pm — No Comments

CISO Guide: Enterprise Mobility Management (EMM) Productivity Transformation Report

As more people use mobile devices to work, what are the key elements of an Enterprise Mobility Management (EMM) solution that successfully allow content creation, editing, sharing, syncing and pushing to mobile devices? …



Continue

Added by Gireesh Kumar on April 6, 2017 at 12:00pm — No Comments

2016 Community Achievements & 2017 Goals

2016 has been a great year for the CISO Platform Community and our vision to create tangible community goods. We wanted to thank all those who made valuable contributions to make this happen. 

We have created more than 200+ checklist. Here are some of them listed:

Partial List of Past community projects-

  1. Cyber Crisis Management Plan …
Continue

Added by pritha on March 30, 2017 at 5:00pm — No Comments

I Love Ransomware

Before you go all torches and pitchforks on me, hear me out.

I hated writing this article. Truly. My industry is, at its core, a service industry. Overwhelmingly I meet people who go into IT service, support and cybersecurity that have a real desire to help others.…

Continue

Added by Meghana P on March 8, 2017 at 1:00pm — No Comments

Ransomware in ICS/SCADA ... It's Happening and Predictions

One is not exactly channeling Nostradamus to predict that ransomware attacks will hit Industrial Control Systems (ICS). The importance of a reliable, high integrity backup and ability to recover in an acceptable timeframe is the same for ICS and enterprise network…

Continue

Added by Meghana P on March 8, 2017 at 11:30am — No Comments

Top 4 Resources on IoT Security from 'Task Force Blogathon'

A big thank you to our  CISO Platform IoT Security Task Force. They did a 6 hour blogathon and came up with very interesting articles for our community.



If you love it, don't forget to share it !…

Continue

Added by pritha on March 3, 2017 at 11:36am — No Comments

CISO Guide: Mobile Security & Business Transformation Study

Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business

Ninety-nine percent of the enterprise workforce currently uses mobile devices - smart phones and tablets - to perform their jobs today. And nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits.…

Continue

Added by Gireesh Kumar on February 28, 2017 at 3:00pm — No Comments

Cyber Insurance May Affect Incident Response Industry

Faced with the risk of cyberattacks, the prospect of losing data and the potential for large fines, the private sector has turned to the insurance industry to protect against losses arising from all manner of information security incidents. Research from CFC Underwriting shows a 50% growth in demand for cyberinsurance last year and the firm expects continued high demand for cyber insurance products in 2017.

The cyberinsurance industry is growing quickly as a result. Allianz estimates…

Continue

Added by pritha on February 22, 2017 at 12:00pm — No Comments

Monthly Archives

2017

2016

2015

2014

2013

2012

1999

 

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts