All Blog Posts (709)

Incident Response Process - Signs Of Compromise

Here are some indicators which will help you detect a compromise :

  • Identification of same email from public domain to significant number of users or C-level employees or high value targets; encrypted attachments, password protected and zipped and protected to escape email malware filter; (put user in the reference list)
  • End point alert / HIPS / Host based malware alerts for local script execution for the same user, raise incident
  • Identify…
Continue

Added by pritha on September 19, 2017 at 4:20pm — No Comments

Top 8 Past Talks By Dr.Phil Polstra, Moshe Ferber, Gregory Pickett, Murray Goldschmidt & more @SACON

Top Past Talks By Moshe Ferber

Frequent Speaker at DEFCON, Blackhat, RSAC APJ, Royal Society London

Renowned Cloud Security Expert

1. From Zero To Secure In 1 Minute (Securing IaaS)

Conference : DEFCON 23

For complete presentation/slide : …

Continue

Added by pritha on September 12, 2017 at 12:00pm — No Comments

Gartner Magic Quadrant for Enterprise Mobility Management 2017

Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint strategies, must maintain focus on near- and long-term goals in this dynamic segment. 

>> …

Continue

Added by CISO Platform on September 5, 2017 at 3:30pm — No Comments

Technologies For Security Of BYOD

This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.

The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect the data and offer ability to stay connected. A reliable BYOD policy is required to help and safeguard our network. BYOD is to develop a policy that…

Continue

Added by pritha on August 30, 2017 at 2:00pm — No Comments

The Cyber Security Concerns - An interesting read

Snapshot of some numbers from the article link above.…
Continue

Added by Sunil Pandey on August 29, 2017 at 7:00am — No Comments

How to design an effective phishing simulation ?

This article was contributed by Sridhar Govardhan, CISA, CISM, CEH, General Manager-Cyber Security at Wipro

Phishing is a type of social engineering attack. Using phishing email, the attacker cleverly manipulates the natural human tendency to trust others and tricks the victim into act as per the instructed in the email. To be convincing, the fraudster will use…

Continue

Added by pritha on August 28, 2017 at 2:03pm — No Comments

Free and Open Source Software Evaulation parameters

Below are a few free & open source software evaluation parameters:

Parameters Description
Community The driving force and main…
Continue

Added by Sridharan on August 21, 2017 at 6:39pm — No Comments

Complete Guide To Log & Event Management (by Anton Chuvakin Gartner)

Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies but also on architecting their joint deployments. In addition, he will provide recommendations for companies…

Continue

Added by CISO Platform on August 18, 2017 at 12:30pm — No Comments

eBook : Deception 2.0 for Dummies

Deception is a very useful and effective tactic to detect and evade threats in many situations. The modern cybersecurity situation is one such example.

This book explains cybersecurity deception and technologies in six short chapters which includes:…

Continue

Added by CISO Platform on August 18, 2017 at 12:00pm — No Comments

Top 9 Past Security Talks By Dr. Phil Polstra

Dr. Philip Polstra

Author of ‘Linux Forensic’, 'Windows Forensic', 'Hacking & Penetration Testing With Low Power Devices' | Frequent speaker at DEFCON, Blackhat, BSides, GrrCON, ShakaCON | Renowned forensic expert

About : Digital forensics professor by day. Hardware hacker and penetration tester by night. Associate Professor, Digital Forensics at Bloomsburg University of Pennsylvania. Attended Northcentral University

Dr. Phil Polstra shall be conducting a Handson…

Continue

Added by pritha on August 11, 2017 at 7:30pm — No Comments

Reference Security Architecture for Mobility- Insurance Task Force

The project title for this task force is “Reference security architecture for Mobility”. Some of the key things that you are going to learn from this presentation is:

  • The reader will learn about the current aspects of mobility, its use…
Continue

Added by Balaji Gowda on August 2, 2017 at 12:30pm — No Comments

Infrastructure and Cyber Security Trends and Challenges

It is important to understand the new trends that are occurring amongst cyber security experts to make sure you properly protect your organization. The following are some key trends that you need to be aware of.

1) Data Co-relation Before adding more devices to a network, perform data…

Continue

Added by Sayyad Salim on August 2, 2017 at 10:30am — No Comments

Cyber Security Maturity Model- IT/ITES Task Force

The project title for this task force is “Cyber Security Maturity Model for Organizations”. Some of the key things that you are going to learn from this presentation is:

  • The user organizations will learn, how to easily adapt a cyber security maturity assessment model based on the widely accepted frameworks such as NIST…
Continue

Added by Balaji Gowda on August 1, 2017 at 5:30pm — No Comments

Basics Of Cyber Kill Chain Model

Cyber Kill Chain Model 

In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks

  • Situational Awareness - Ability to identify what is happening in the networks and system landscape
  • Reconnaissance - Identification and selection of the target/s host or network by active scanning
  • Weaponization & delivery -…
Continue

Added by pritha on July 14, 2017 at 10:00am — No Comments

Launching Top Security Vendor Awards - Solely Based On User Reviews on FireCompass

Today buying has become more social & buyers want to know what their peers or what other buyers & users are saying about it. FireCompass thinks it is indeed a very great achievement when your buyers love your product and we want to help you spread that…
Continue

Added by CISO Platform on July 13, 2017 at 5:00pm — No Comments

NIST Aligned Process For Threat Management

This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the full slide…

Continue

Added by pritha on July 13, 2017 at 12:30pm — No Comments

Top Learnings From Phising Drill

Article submitted by Suryanarayanan K, ,Central Bank Of India

Phishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensitive information such as usernames, passwords, credit/debit card details etc., often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is typically carried out by email…

Continue

Added by pritha on July 9, 2017 at 2:30pm — No Comments

Announcing Pre-Registrations@ SACON 2017: Security Architecture Conference

Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.

Agenda Highlights: SACON 2017 aims to…

Continue

Added by CISO Platform on July 7, 2017 at 5:30pm — No Comments

Advanced Security Operations Centre (SOC) - Features & Technical Capabilities

This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.

This was presented at SACON and speakers explain subjects in detail during sessions for deeper understanding. Next…

Continue

Added by pritha on July 2, 2017 at 4:00am — No Comments

Machine Learning & Analytics For Threat Detection

This gives a glimpse of how 'Machine Learning & Analytics' can be used for Threat Detection. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.

This was presented at SACON and speakers explain subjects in detail during sessions for deeper understanding. Next sessions are…

Continue

Added by pritha on July 2, 2017 at 2:00am — No Comments

Monthly Archives

2017

2016

2015

2014

2013

2012

1999

 

Contact Us

Email: contact@cisoplatform.com

InfoSec Media Private Limited, First Floor, # 48, Dr DV Gundappa Road, Basavanagudi, Bangalore, Karnataka - 560004

© 2017   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts