Social Network For CISO (Chief Information Security Officers)
We wanted to share an alert with all the community members
Yesterday HCL data Breach was made public by a security research organization which is now in news. We wanted to share some best practices on how to handle such situations
Dos & Don'ts On How To Handle Such Situations
Added by pritha on May 23, 2019 at 3:49pm — No Comments
We were excited to have the head of engineering, FireCompass (Jitendra Chauhan) with us. He shares with us insights from his team's 12 month monitoring of the hidden internet that led to some shocking results.
Key Points Of Focus :
- Major causes of recent breaches
- Results from indexing the deep, dark & surface web
(Exposed database, Leaked passwords, Code leaks, Open cloud resources, Exposed network…
Added by pritha on April 26, 2019 at 5:35pm — No Comments
Businesses and organizations are fielding more & more next-generation Information Security technologies to reduce their risks as businesses leverage cloud capabilities and from advanced persistent threats. Unfortunately, we see our customers falling into a common Information Technology and general acquisition trap: Significantly underestimating the complexity, cost, and time to complete the Next Generation Firewall (NGFW)…Continue
Added by Meghana P on April 4, 2019 at 2:27pm — No Comments
Threat Intelligence - It is the one word we all have heard various times recently. The subject has been under constant scrutiny for a while now, but do we understand it? Moreover, since it has been viewed very differently from different viewpoints of various security professionals, to start with let’s get to the crux of it. The ultimate goal is to provide a binary answer to the question, “Do I have a compromised system in my…Continue
Added by Aditya Khullar on March 12, 2019 at 11:30am — No Comments
BASIC GUIDE TO CESG - CAS(T)
BY: MANOJ VAKEKATTIL
CESG Assured Services for Telecommunication –CAS(T)
CAS(T) is a certification scheme for clients providing telecommunication services . The scheme supports the government public services Network (PSN),which requires all telecom services procured by public sector bodies be assured to suitably protect…
Added by Manoj Vakekattil on March 11, 2019 at 1:30pm — No Comments
DevSecOps, or the blending of an enterprise’s applications development with systems operations teams with collaboration of security has become a trendy IT topic. The new operating model is often employed in conjunction with Agile software development methods and leverages the scalability of cloud computing — all in the interest of making companies more nimble and competitive. Today CIO’s/CISO’s should revise DevOps to include Security module from beginning. Investing in firewalls and…Continue
Added by Aditya Khullar on March 11, 2019 at 1:11pm — No Comments
The RSAC Innovation Sandbox Contest brings out cybersecurity’s boldest new innovators who have made it their mission to minimize infosec risk. Each year, 10 finalists grab the spotlight for a three-minute pitch while demonstrating groundbreaking security technologies to the broader RSA Conference community. Over the past five years, the contests top 10 finalists' have received over $2.05 billion in investments. (Source :…Continue
Added by pritha on March 7, 2019 at 8:30pm — No Comments
Get free access to the presentations by Dr. Phil Polstra, Wayne Tufek, Madhu Akula, Anant Shrivastava, Shomiron Das Gupta, Wasim Halani, Sahir Hidayatullah, Sudarshan Pisupati & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 500+ participants, this was the 6th edition of SACON and here are a few highlights we wanted to share with you. It was held on 15-16th Feb, Bangalore, India.…Continue
Added by pritha on February 28, 2019 at 4:30pm — No Comments
Secure your Gmail , Hotmail & Dropbox with 2-Factor Authentication
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically your password and the another is security code time-based One-Time-Password (OTP).
Two-step verification is an additional security which is now enabled on Personal Email Accounts, Social Media etc e.g.: iCloud, Gmail, Hotmail ,…Continue
Added by Prasad on February 28, 2019 at 9:00am — No Comments
State Of Automotive Security
Niloy Ray, Deputy General Manager, Mercedes Benz Research & Development India Pvt Ltd
Added by Nazia on February 27, 2019 at 5:46pm — No Comments
From The Hidden Internet : Lessons from the 12 Months of Monitoring
Jitendra Chauhan, PR Architect, Firecompass
Added by Nazia on February 27, 2019 at 5:45pm — No Comments
Scaling Appsec Program With Cyber Range
ED Adams, CEO, Security Innovation
Satish Janardhanan, Head Of Application Security, Accenture
Added by Nazia on February 27, 2019 at 5:41pm — No Comments
CISO Platform Annual Summit @Bangalore, last week saw over 150+ attendees for over 2 days making the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.
It was held on 15th & 16th Feb, Taj Yeshwantpur, Bangalore, India.…Continue
Added by Nazia on February 27, 2019 at 5:30pm — No Comments
Making security an essential part of your IT operations requires a disciplined approach to the development process, and that begins with teaching developers security awareness. Developers need to understand security from their own point of view, so they can see and integrate security into the complete software-development life cycle.
They need to bring…
Added by James P. Courtney II, C|CISO on February 21, 2019 at 12:06am — No Comments
FREE AND OPEN SOURCE SOFTWARE (FOSS) EVALATION PARAMETERS
The driving force and main resource for open source project
Status of development and progress…
Added by Sridharan on February 20, 2019 at 11:30am — No Comments
Apache Struts Remote Code Execution Vulnerability was discovered couple of years ago and it was used to breach high profile companies like Equifax. It was in news for quite a while for how the breach was (mis)handled by Equifax. It is a high severity vulnerability where many companies worked day and night to update their Apache Struts installations.
Buy today I discovered one of the Indian Government websites is launched with this critical Apache Struts Remote Code Execution…Continue
Added by Venkata Satish Guttula on January 15, 2019 at 5:07pm — No Comments
An effective incident response plan includes people, process and technology. While many processes and technologies are put in place, there is always a fear of the unknown. A good process includes looking out for zero day vulnerabilities ... and timely patching. This involves the people part, and we have many times seen that the human element is the weakest link in cybersecurity.
Take the example of the…Continue
Added by Venkata Satish Guttula on January 9, 2019 at 9:30am — No Comments
We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 4 categories – CISO, Tech Leaders, Ethical Hackers and Media/Analyst.
As a part of our …Continue
Added by CISO Platform on December 11, 2018 at 4:30pm — No Comments
CISO Platform 100, 2019 (India):…Continue
Added by Shubham Gupta on October 12, 2018 at 3:00pm — No Comments
Our editorial team has handpicked some great talks from Black Hat Conference - one of the largest IT Security Conference in the world.
Black Hat - built by and for the global InfoSec community - returns to Las Vegas for its 21st year providing attendees with the very latest in research, development and trends. This six day event begins with four days of intense technical training for security practitioners of all levels (August 4-7) followed by the two-day main conference featuring…Continue
Added by Shubham Gupta on October 4, 2018 at 12:30am — No Comments