All Blog Posts (805)

Forrester Wave WAF Guide 2018 : Top 10 Vendors That Matter & How They Stack Up

The Forrester Wave™ Guide on Web Application Firewall, Q2 2018, is a detailed guide that helps you understand the 33 criteria developed by Forrester for evaluating web application firewall vendors. 

In this evaluation Forrester has identified 10 most significant ones - Akamai Technologies, Amazon Web Services, Barracuda Networks, Cloudflare, F5 Networks, Fortinet, Imperva, Positive Technologies, Radware and Rohde &…

Continue

Added by CISO Platform on August 8, 2018 at 3:00pm — No Comments

(20 Page Guide) Critical Capabilities For Evaluating WAF - Web Application Firewall

With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can take to protect themselves from breaches and secure their customers.…

Continue

Added by CISO Platform on July 25, 2018 at 12:00pm — No Comments

India Security Technology Adoption Report 2018

Security Technology Adoption Report 2018 is a study by CISO Platform in association with FireCompass. This survey was conducted online and the results discussed in the report are based on the responses of CISO’s across the country. There are more than 395 data points from across the country.…

Continue

Added by CISO Platform on July 10, 2018 at 3:00pm — No Comments

Top 5 Talks on Technology Infrastructure & Operations from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Technology Infrastructure & Operations at RSA Conference USA 2018.



RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions,…

Continue

Added by Kuladeep Tummala on June 21, 2018 at 12:00pm — No Comments

Top 4 Talks on Mobile & IoT Security from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Mobile & IoT Security at RSA Conference USA 2018.



RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and…

Continue

Added by Kuladeep Tummala on June 20, 2018 at 5:00pm — No Comments

Top 3 Talks on Machine Learning from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Machine Learning at RSA Conference USA 2018.



RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars.…

Continue

Added by Kuladeep Tummala on June 20, 2018 at 3:30pm — No Comments

Top 7 Talks on Identity & Access Management from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Identity & Access Management at RSA Conference USA 2018.



RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials…

Continue

Added by Kuladeep Tummala on June 20, 2018 at 3:00pm — No Comments

Top 5 Talks on Governance, Risk & Compliance from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Governance, Risk & Compliance at RSA Conference USA 2018.



RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions,…

Continue

Added by Kuladeep Tummala on June 20, 2018 at 1:00pm — No Comments

Top 4 Talks on DevOps from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on DevOps at RSA Conference USA 2018.



RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars. Keynotes,…

Continue

Added by Kuladeep Tummala on June 20, 2018 at 12:00pm — No Comments

Top 5 Talks on Cryptography from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cryptography at RSA Conference USA 2018.



RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials and seminars.…

Continue

Added by Kuladeep Tummala on June 19, 2018 at 4:00pm — No Comments

Top 10 Talks on Application Security from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Application Security at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions, top notch track sessions, tutorials…

Continue

Added by Kuladeep Tummala on June 19, 2018 at 2:30pm — No Comments

Stop Translating, Start Defending: Common Language for Managing Cyber-Risk

Time is of the essence when protecting your organization from complex cyberthreats. The clock doesn’t start when you have been breached—it’s always ticking. The board must articulate risk tolerances, management must set the strategy and IT must execute. The NIST CSF provides a common language for internal and external stakeholders, and helps the organization to stop translating and start defending.



Learning Objectives:

1: Learn how the NIST CSF can be used for more than…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 1:13pm — No Comments

SDN and Security: A Marriage Made in Heaven. Or Not.

Software-defined networking has come onto the scene and changed the way we think about moving packets throughout a network. But it has also morphed into multiple definitions and approaches, driven by both vendors and enterprise customers. But how does security fit into this picture? This talk will discuss the convergence of SDN and security and will try to make sense of them both.



Learning Objectives:

1: Understand all types of SDN.

2: Understand SDN and…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 1:10pm — No Comments

From SIEM to SOC: Crossing the Cybersecurity Chasm

You own a SIEM, but to be secure, you need a Security Operations Center! How do you cross the chasm? Do you hire staff or outsource? And what skills are needed? Mike Ostrowski, a cybersecurity industry veteran, will review common pitfalls experienced through the journey from SIEM to SOC, the pros and cons of an all in-house SOC vs. outsourcing, and the benefits of a hybrid SOC model.



Learning Objectives:

1: You own a SIEM, but to be secure, you need a SOC. How do you…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 1:06pm — No Comments

Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Management

In the last year, we’ve seen numerous attacks with global consequences leveraging exploits against well-publicized vulnerabilities with available patches. This presentation will provide Forrester’s perspective on the challenges clients face in the vuln management space and make recommendations for improving how we prioritize and communicate vulnerability risk within our organizations.



Learning Objectives:

1: Outline a long-term strategy for evolving vulnerability risk…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 1:02pm — No Comments

Evidence-Based Security: The New Top Five Controls

Most cybersecurity professionals know the CIS Top Five Critical Security Controls. Yet, the evidence that they are effective is slim. Using data on cyber-incidents, researchers looked at the attack paths used by adversaries and determined what controls could have disrupted these attack paths. The result is a new set of critical controls that organizations should implement on a priority basis.



Learning Objectives:

1: Understand evidence-based approach to selecting…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 12:59pm — No Comments

The New Landscape of Airborne Cyberattacks

A virus-like cyberattack spreading over the air may sound far-fetched, but new research proves the airborne attack surface is here. Join the Armis researchers who discovered the viral IoT vulnerability, BlueBorne, as they walk through the airborne threat landscape, its risks and tips for tackling them, and for a live demo of an attack using the BlueBorne vector.



Learning Objectives:

1: Understand the airborne attack vector, its threats and consequences of attacks.…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 12:52pm — No Comments

The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem

While near-ultrasonic communications are gradually established as an alternative to Bluetooth and WiFi, the technology remains largely unregulated. This talk will go through the security challenges that the ecosystem faced from its inception, demonstrate its shortcomings and propose mitigations. The insights shared will inform potential adopters and those seeking to prevent security incidents.



Learning Objectives:

1: Learn about near-ultrasonic communication technology…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 12:49pm — No Comments

From IT to IoT: Bridging the Growing Cybersecurity Divide

With the widespread growth of IOT devices and services, security is a priority. This session will discuss the challenges of implementing security solutions for IoT services for security professionals who are looking at things from an IT viewpoint. Traditional IT security solutions may not be directly applicable to the IoT ecosystem. New IoT specific threats and challenges need to be addressed.



Learning Objectives:

1: Learn about the top IoT threats.

2: Discover how…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 12:46pm — No Comments

Security and Privacy of Machine Learning

Machine learning is a powerful new tool that can be used for security applications (for example, to detect malware) but machine learning itself introduces many new attack surfaces. For example, attackers can control the output of machine learning models by manipulating their inputs or training data. In this session, I give an overview of the emerging field of machine learning security and privacy.



Learning Objectives:

1: Learn about vulnerabilities of machine…

Continue

Added by Kuladeep Tummala on June 18, 2018 at 12:43pm — No Comments

Monthly Archives

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts