Social Network For CISO (Chief Information Security Officers)
Here's a list of World's Best and Most Popular IT Security Conferences. Details such as Tentative Time, Pass Price and Locations are mentioned so you can plan your Calendar.
Top IT Security Conferences In The World:
1. Black Hat
Claims to be the most technical and relevant global IT security conference in the world. Black Hat USA believes in…Continue
Added by pritha on June 30, 2015 at 10:00pm — No Comments
Here is a comprehensive checklist to Evaluate SIEM Vendors. We highly appreciate this community contribution.
by Sunil Soni, CISO, Punjab National Bank
Vendor Selection Framework For Integration Of Threat Intelligence With SIEM…Continue
Added by pritha on June 29, 2015 at 12:00pm — No Comments
The Checklist for Incident Response Management as follows:The Key Areas To Focus on Incident Response,Computer Forensics,Network Security and The Secure Architecture.
Major Areas Of Focus:
Added by pritha on June 26, 2015 at 5:00pm — No Comments
Recently, HP published their yearly Cyber Risk Report 2015. Having many typical things spotlighted in this report such as growing number of ATM and IOT Security events, we have found some parts that are relevant to business application security, which we are honored to share with our readers, customers and partners.
According to their report, HP Zero Day Initiative were busy coordinating the disclosure and remediation of over…Continue
Added by Alexander Polyakov on June 25, 2015 at 7:41pm — No Comments
On 11th of May, a security headline broke out in the news, it was about an attack on USIS (U.S. Investigations Services) conducted potentially by Chinese state-sponsored hackers via a vulnerability in SAP Software. Hackers broke into third-party software in 2013 to open personal records of federal employees and contractors with access to classified intelligence, according to the government's largest private employee investigation…Continue
Added by Alexander Polyakov on June 25, 2015 at 6:30pm — No Comments
The peace, prosperity and economic development of any Nation depends upon its critical infrastructure and how well-protected it is. These critical infrastructures are distributed physically and virtually in space and time. The Supervisory Control and Data Acquisition (SCADA) systems are an important component of the process to control and monitor industrial and infrastructure process 24/7. Initially, these SCADA systems were designed to run in an…Continue
SAP HANA is a recent key product of SAP. It is a software solution based on the in-memory technology, that reduces the time of the data processing significantly.Explore more the SAP.
In our previous article we’ve already covered how SAP ABAP Security Storage works. Today’s post is dedicated to SAP HANA Security Storage.
SAP HANA is a recent key product of SAP. It is a software solution based on the…Continue
Added by Alexander Polyakov on June 24, 2015 at 4:00pm — No Comments
The next Leap(26th leap) Second will be on 30 June,2015. The last one was on 30 June,2012.
What Is It?
Earth's rotation is slowing down around it's own axis, so we need to Leap a few seconds to catch up. Occasionally seconds are added to UTC to compensate for its drift from the Solar Mean Time or UT1. UTC (Coordinated Universal Time) is followed universally which approximates to UT1.…Continue
Added by pritha on June 23, 2015 at 8:30pm — No Comments
With this article we are starting new series of posts giving a review of one of the most frequent vulnerability which affects a lot of SAP modules: cross-site scripting, or XSS. XSS is by far one of the most popular vulnerability indeed in all products and a most popular vulnerability in SAP products with total number of 628 vulnerabilities that is almost 22% of all vulnerabilities ever found in SAP during 12 years. You can find this in our latest research…Continue
Added by Alexander Polyakov on June 17, 2015 at 3:45pm — No Comments
April 17, 2015 – As a part of monthly updates Microsoft released security update MS15-034 which closes vulnerability in driver HTTP.sys which enables an attacker to execute arbitrary code on OS remotely.
This update has a critical status as almost every modern version of Microsoft operating systems (Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2) is vulnerable.
Added by Alexander Polyakov on June 17, 2015 at 12:49pm — No Comments
Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD policy – Bring Your Own Device) and gain access to critical corporate information.
SAP Mobile Platform (or SMP, formerly called Sybase Unwired Platform, or SUP) is a MEAP (Mobile Enterprise Application Platform) solution. SMP is used for monitoring…Continue
Added by Alexander Polyakov on June 17, 2015 at 12:48pm — No Comments
Imagine you are on a shopping website or on a travel booking website and you see a deal which is quite exciting and your try and book, either you login with your account on the website or if you proceed to pay it gives a pop up, “Oops” price just got up by x amount and you end up paying the higher price which turns out to be a deep hole on your pocket.
The reason that amount YOU will be charged is due to a complex formula based on the condition of other items you've bought or…Continue
Added by Anubhav Bathla on June 10, 2015 at 2:00pm — No Comments
End point Protection Solution:
Managing the End point is one of the key areas where security to be built strongly. As this is the entry point, arresting at this level would help and make our network stable. So Data at rest (end storage), data during motion (connectivity), data in use(end point) should be secured . Data in use is always more threat than others. In present scenario, end point does not mean only desktop, it includes mobile, tab, thin client etc. With boom…Continue
Added by V.SENDIL KUMAR on June 10, 2015 at 1:30pm — No Comments
CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber Security Professionals
New Delhi, Bangalore, India, June 4, 2015: CISO Platform, an online community for senior IT Security Professionals announces the official launch of its comprehensive…Continue
Added by CISO Platform on June 6, 2015 at 11:30am — No Comments