Social Network For CISO (Chief Information Security Officers)
Components of Google BeyondCorp
Device & Hosts
Added by pritha on June 24, 2017 at 2:56am — No Comments
Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents, Zero Day Discovery, Co-Founder at FireCompass]…Continue
Added by pritha on June 20, 2017 at 12:30pm — No Comments
With Big Data and Behavior Analytics advances, the need of an SIEM at the enterprise level may be a question. This question is addressed in this report. It analyses, dissects and tries to find out the pros and cons of both sides.Continue
Added by pritha on June 14, 2017 at 12:30pm — No Comments
This report gives insight into 4 key cyber security incident trends observed in 2015. Includes top insights and detailed analysis of each attack and how one could prevent their organisation from being a target as well as mitigation.Continue
Added by pritha on June 14, 2017 at 12:00pm — No Comments
A ransomware attack crippled hundreds of computer networks across the globe. The systems were shut down and rendered useless until the attackers received the “ransom” through money transfer on Bitcoin. The ransomware essentially encrypts the files on the target microsoft windows system and makes them inaccessible to users. The initial transfer demanded by the ransomware is USD 300 which may later increase to USD 600.
After a host of different ransomware attacks that hit…Continue
Added by Prasad on June 8, 2017 at 11:30am — No Comments
Building a new SOC capability may involve lot of planning and would attract huge initial investment.
While there are multiple approaches to address this, given below are some of the simple steps one can follow:
1. Understanding Business Goals, type of business, organization culture & constraints & budgets
Added by Vishwas Pitre on June 7, 2017 at 1:00pm — No Comments
Author - Sanjay D. Tiwari, CISO, Suryoday Small Finance Bank
Prioritizing the handling of the incident is perhaps the most critical decision point in the incident handling process.
Incidents should not be handled on a first come, first served basis because of resource limitations. Instead, handling should be prioritized based on severity. Prioritizing incident defines how quickly the addressed incident need to be resolved.
Prioritization based on how quickly an incident to…Continue
Added by pritha on June 6, 2017 at 7:00pm — No Comments
In this Forrester's report they identify and analyze 13 significant firms in the IT security consulting services - Accenture, Atos, BAE Systems, Dell SecureWorks, Deloitte, EY, HPE, IBM Security Services, KPMG, Protiviti, PwC, Verizon & Wipro …Continue
Added by pritha on June 1, 2017 at 5:00pm — No Comments