August 2016 Blog Posts (10)

'Shadow Breakers' Leak posed serious threat for Organizations

We are keep getting surprises in the cyber-security world and this is one of the biggest surprise. Few weeks back, someone out of the blue started leaking the NSA's secret. The so called Shadow Brokers leak dropped 300MB of stolen data onto the open web. 300MB dropped of stolen data which includes live exploits for some of the web’s most crucial network infrastructure, apparently stolen from the NSA in 2013.



Now the question…

Continue

Added by Vaibhav Singhal (CISO Platform) on August 29, 2016 at 5:00pm — No Comments

Sneak Peek Into the Top Talks @ SACON, Goa - 2016

Turbo Talks…



Continue

Added by Ravi Mishra (CISO Platform) on August 25, 2016 at 3:30pm — No Comments

Top 5 Technologies To Protect Against Zero Day Malware Detection

In this blog we have shortlisted 5 key technologies to help you fight against Zero Day Malware.



Cyber-targeted attacks such as APTs are the primary cause of concern for any organization that holds data which can be of interest to attackers. The motivations are diverse and the attackers are highly sophisticated and relentless in their approach. Traditional security tools are proving to be ineffective against such attacks as evidenced by the ubiquitous stories of…

Continue

Added by Atul kumar Singh (CISO Platform) on August 22, 2016 at 10:00am — No Comments

Top Cyber Security Framework for Banks Globally|Network Assessment

In this article, We are covering best security frameworks that are implemented in the banks across the world.



Cyber security is an increasing concern for every business. And especially for banks who held a lot of confidential data and transaction details, it is utmost important for banks to have required cyber security solution and processes at the place.

Many regulatory bodies like RBI in India, FFIEC in…

Continue

Added by Amit, CISO Platform on August 18, 2016 at 12:00pm — No Comments

Vendor Selection - An uphill task for CISO's

An average CISO Tenure is 17 months. This is why we brought up the burnout issue. 

CISO Role Expectations-

Below are the expectations from CISO's and these challenges faced by CISO's can make them fired/quit. Sometimes, they can't bear pressure and responsibilities that are upon on them:-

  • Prevent any security risks in an enterprise (Superpower…
Continue

Added by Vaibhav Singhal (CISO Platform) on August 12, 2016 at 12:00pm — No Comments

Pokemon Go - Top Tips to Minimize Security Risks

Today, I am going to talk about the game which has become more than a game for people around the world. You guessed it right, I am talking about Pokemon Go, developed by Niantic. The important mechanic in the game is to be able to use GPS which can track your movement and combine that with mobile data points. But now the game is gaining attention specially in the security domain.

Let's see what all security concerns you needed…

Continue

Added by Vaibhav Singhal (CISO Platform) on August 12, 2016 at 11:00am — No Comments

Top Emerging APT Security Vendors Globally

Emerging Vendors are the vendors who have been innovative and has given the fresh perspective to the conventional security methods. In very less time, these start-ups have been able to make their name in the APT space. Here is the list of the Top Emerging vendors in the field of APT Security.



1. Illusive Networks …

Continue

Added by Vaibhav Singhal (CISO Platform) on August 3, 2016 at 1:30pm — No Comments

6 Criterias For Evaluating Sandbox Solutions

A sandbox is a security mechanism to analyze the behaviour of any suspicious file types and web objects by allowing it to execute in an isolated environment with constrained resources. It allows one to execute any untested, un-trusted/outsourced code without causing any damage to the host machine and production environment. Usually the program is run into Virtual environment or emulation software which provide the feel and functionality similar to the actual environment.

There…

Continue

Added by pritha on August 1, 2016 at 6:15pm — No Comments

6 Free log open source management software tools

Log management plays a vital role for constructing an enterprise class SOC. Below is the list of couple of open-source Log Management tools which provide the capability of reliable log collection, Log normalization and relaying of Log messages to a central location for their log time storage.



Log management is one of the primary requirements for building an enterprise class SOC. In security, Log analysis is often the first step in incident forensics. Operating systems…

Continue

Added by pritha on August 1, 2016 at 6:00pm — No Comments

Ransomware Attacks: How Prepared Are You?

RansomWare is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. [RM1] The RansomWare arrives via email attachments, insecure downloads,  use of outdated browser's, or through Trojans such as Zeus etc. Once executed the malware usually reaches out to its Command & Control server over an internet connection to get the…

Continue

Added by pritha on August 1, 2016 at 6:00pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts