April 2015 Blog Posts (19)

Top Talks from RSA Conference 2015 - San Francisco

We had a long and nice week at RSA Conference 2015 in San Franciso. Some of you might have missed the event or missed some of the good talks even though you were there. so we have handpicked the best of RSA  just for you.

Important Note:

  • All presentations are courtesy RSA and is presented as-is without any modification
  • Some of the descriptions below are taken from RSA website (…
Continue

Added by pritha on April 29, 2015 at 11:30am — No Comments

Tools Of The Hardware Hacking Trade

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:30am — No Comments

How To Avoid The Top Ten Software Security Flaws

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Rapid Threat Modeling Techniques

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Westjets Security Architecture Made Simple We Finally Got It Right

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Achieving Defendable Architectures Via Threat Driven Methodologies

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:30am — No Comments

Making Threat Intelligence Actionable with STIX

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:30am — No Comments

Implementing An Automated Incident Response Architecture

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:30am — No Comments

Threat Intelligence Is Like Three Day Potty Training

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Cyber Security Operation Center for Critical Infrastructure Protection

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Don't Get Left In The Dust How To Evolve From CISO To CIRO

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Security Metrics That Your Board Actually Cares About

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Hottest Buzzword Trend Analysis from RSA Conference 2015- San Francisco

RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.

How we did the analysis?

We took hundreds of pics of booths all around the expo floor and tried to do the keyword analysis and find out the most prominent buzz words. We tried to give importance to relative size of the…

Continue

Added by CISO Platform on April 28, 2015 at 1:00am — No Comments

Key Learning from Amit Yoran's keynote @ RSA Conference 2015

I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.

Taller walls won't solve the problem. We need fundamentally different approach which is not discovered yet.

We need fundamental shifts in computer science research to be more effective in building better…

Continue

Added by CISO Platform on April 28, 2015 at 12:00am — No Comments

Dealing With Vulnerabilities in a Structured Fashion

The effectiveness of cyber security portfolio of an enterprise depends on multiple factors.  Efficient Vulnerability Management Program is one of the critical parameters to be considered. Considering the dynamic nature of the attack vectors, it is important to build the defense in depth from the scratch by adopting a holistic view. The biggest challenge in this arena is to have an effective measurable dynamic process followed…

Continue

Added by Lopa Mudraa Basuu on April 24, 2015 at 10:30am — No Comments

Information Security Awareness Mail of this week

Dear Colleagues,

“ Balance Checking Software App “ is an software application is doing rounds on WhatsApp purportedly to facilitate checking of balance in customers' bank accounts. The Reserve Bank of India (RBI) on Saturday (11th April 2015)warned the…

Continue

Added by venkata ramesh uppalapati on April 20, 2015 at 4:00pm — No Comments

SAP NetWeaver ABAP Security Configuration Part 5: Insecure Settings - File location

This describes about Each Application has its own Security Settings and which won't fit into any crutial issues groups in our series.





Each application has several security settings that do not fit into any of the critical issues groups mentioned in our series of articles.Among such settings there are both standard settings (such as password length or the number of attempts given to enter invalid password) and the specific to the system, individual settings. In this…

Continue

Added by Alexander Polyakov on April 2, 2015 at 8:00pm — No Comments

Encryption and Decryption

The developers of the free & hugely popular encryption program dropped a bombshell at the end of May when they abruptly abandoned the project. The top of their website was emblazoned with the following message in red: "WARNING: Using our Software is not secure as it may contain unfixed security issues." It…

Continue

Added by Bharat Gautam on April 2, 2015 at 4:57pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts