Social Network For CISO (Chief Information Security Officers)
The Cyber Kill Chain Model is widely used in Military Applications, The main Function of this Model is to Malicious executables difference between information security and cybersecurity are transmitted during different stages of Malware Attack.
Cyber Kill Chain Model
In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack,…Continue
Added by pritha on July 14, 2017 at 10:00am — No Comments
Added by CISO Platform on July 13, 2017 at 5:00pm — No Comments
This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the full slide…Continue
Added by pritha on July 13, 2017 at 12:30pm — No Comments
Article submitted by Suryanarayanan K, ,Central Bank Of India
Phishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensitive information such as usernames, passwords, credit/debit card details etc., often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Phishing is typically carried out by email…Continue
Added by pritha on July 9, 2017 at 2:30pm — No Comments
Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.
Agenda Highlights: SACON 2017 aims to…Continue
Added by CISO Platform on July 7, 2017 at 5:30pm — No Comments
This blog was Presented by the SACON, The Speakers explains the Subject clearly for In-depth Understanding. The Advanced Security Features are as follows:Threat Assessment & Hunting,Threat Intelligence, Situational Awareness, Security Analytics.
This was presented at SACON and speakers explain subjects in detail…Continue
Added by pritha on July 2, 2017 at 4:00am — No Comments
This gives a glimpse of how 'Machine Learning & Analytics' can be used for Threat Detection. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.
This was presented at SACON and speakers explain subjects in detail during sessions for deeper understanding. Next sessions are…Continue
Added by pritha on July 2, 2017 at 2:00am — No Comments