September 2016 Blog Posts (4)

Top 10 Open Source or Free IT- Security Tools

Short of resources, but still want to have a strong IT-security ecosystem? There are multiple tools in the market specially for small to medium enterprises who can use these open source tools. Although, they can't match the capabilities as provided by the premium tools provided by big vendors which comes with hefty price tags. But still they provide quite a decent features without burning your pocket. We bring you the list of Top 10 Open Source or Free IT-Security…

Continue

Added by Vaibhav Singhal (CISO Platform) on September 27, 2016 at 11:00am — No Comments

Planning to be a CISO

Everyone wants to know this today. One of the key attributes I have found in all the security people in last 14 years of my career is you need to be naturally skeptical when you look at stuff. This is one key aspect and if you don’t have this you would not a be good security person. You would have to ground that with good business pragmatism, it not about technology, it is about securing.

( Read…

Continue

Added by Syed Azher on September 15, 2016 at 10:00am — No Comments

Top 10 Talks From Black Hat Conference USA, 2016

Our editorial team has handpicked the best of the best talks at Black Hat Conference USA, 2016 - one of the largest IT Security Conferences in the world.

Black Hat conference is a security conference which brings together variety of security professionals and hackers to discuss on the current information security challenges and security landscape. The event is composed of two major sections, the Black Hat briefings and Black Hat trainings. Black Hat 2016 USA was held on July 30 -…

Continue

Added by Atul kumar Singh (CISO Platform) on September 13, 2016 at 10:00pm — No Comments

Aligning security objectives with business objectives

This is about developing information security master plan, the concept is the fact that when you develop a plan you begin by starting risk assessment, not a risk assessment from security stand point but from a business standpoint. You go through that process by interviewing various executive getting their input and understand what they believe are the risks that the business is exposed to. Then you take that way and evaluated risk…

Continue

Added by Syed Azher on September 1, 2016 at 12:00pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts