June 2013 Blog Posts (8)

Why AppSec (Application Security) won't always bail you out of application based risks?

WHY APPSEC (APPLICATION SECURITY) WON’T ALWAYS BAIL YOU OUT OF APPLICATION BASED RISKS?

It is very typical of organizations to perform Web Application (WebApp) Security Assessments before the go-live of newer applications or periodic assessments of their existing applications. And these assessments are known by all sorts of aliases like Application Penetration Testing (App PenTest), Ethical Application Hacking etc. For those companies lacking the internal core…

Continue

Added by Dhananjay Rokde on June 27, 2013 at 11:00am — No Comments

How much Secure is Safe?

Regardless of how safe and secure any organisation may think its IT infrastructure is, they realize that they are still not immune to information security threats. In addition to deploying the right tools and technology, organisations globally needs to develop a robust and competent workforce equipped with the necessary skills to adequately defend its IT infrastructures. These cyber defenders need not just basic trained to sufficiently defend against mounting security threats, more than…

Continue

Added by Sharat AIRANI on June 26, 2013 at 8:00pm — No Comments

Fast Changing Dynamics in Enterprise Mobility

As the organizations are growing in size,workforce is also becoming increasingly mobile. Employees are using mobile devices like smart phones, tablets and laptops to connect andaccess work related data. Enterprises are highly shifting to tablets from desktop pc and even encouraging their employees to bring their tablets or smart phones to work.

There are some key trends which have come to fore with the advent of enterprise mobility.The highly mobile workforce is not restricted to one…

Continue

Added by Kamal Sharma on June 20, 2013 at 11:30am — No Comments

Why are cybercrimes NOT always white-collar crimes?

A generic definition of a crime would be an act that is in violation of the applicable laws. A crime / criminal offense may essentially hurt an individual or the community (city or a nation) at large. This concept has now been taken to the next level with rising popularity of cybercrimes. In recent years, there are several analyst reports on the increasing trends of cybercrimes. Of late; several interchangeable terms for cyber crimes such as, computer crime, cyber fraud, internet crime,…

Continue

Added by Dhananjay Rokde on June 18, 2013 at 10:00am — No Comments

Proactive Security Management - “The next BIG focus“

IT Trends and challenges:

World is becoming Instrumental, Interconnected and Intelligent. IT security teams in enterprises are faced with rapidly mutating threats at every possible point of entry. This is fuelled by the fast evolution of threat landscape and sea of changes in network and security architecture.

  • Changing network paradigm
  • Network has taken center stage – Wired or wire-free
  • Excitement starts from data center
  • BIG data – A true…
Continue

Added by Sharat AIRANI on June 16, 2013 at 5:00pm — No Comments

Disaster Recovery and Business Continuity Management

Today enterprises live in a world where natural or man made disasters can crumble a business to its knees. It is therefore critically important for these enterprises to recognise the fact that disasters are real and happen and it is essential they have a structured programme to protect the information from external and internal threats and disasters.

Common Disasters:

 …

Continue

Added by Ram Mohan C on June 6, 2013 at 12:00pm — 1 Comment

How to write a great article in less than 30 mins

We all face difficulties in expressing our thoughts. Here are a few pointers which will help a person to write great articles in just 30 mins.

Step 1: Define the headline

When you write the articles ask yourself 3 questions:

  1. Are you saying something new?
  2. Are you saying something old but in a new way?
  3. Are you saying something which will help others to save time, money or effort?

If any…

Continue

Added by CISO Platform on June 5, 2013 at 5:30pm — No Comments

5 easy ways to build your personal brand !

How important is your personal brand in professional success?

Nobody can deny that personal reputation is critical in the path of professional success. Definitely the most important factor is "who you are?" but it is equally important "how others perceive you?".

In today's world due to online tools it is lot easier to build your personal brand. Here are the top steps:

 

Step 1:…

Continue

Added by CISO Platform on June 4, 2013 at 12:00pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts