CISO Platform's Blog (116)

Top 3 Things CISOs Should Avoid In A Board Presentation

There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk of individual liability for corporate directors who do not take appropriate responsibility for oversight of cybersecurity.…

Continue

Added by CISO Platform on August 31, 2018 at 11:30am — No Comments

Short Guide On Shadow IT 2018

Not having real time view of your dynamic digital footprint and the risks it is introducing, leaves an organization in the dark and serves as a low hanging fruit for attackers to use this exposed information to fuel their malicious attacks. Understanding the impacts of Shadow IT can be crucial.…

Continue

Added by CISO Platform on August 21, 2018 at 7:00pm — No Comments

Forrester Wave WAF Guide 2018 : Top 10 Vendors That Matter & How They Stack Up

The Forrester Wave™ Guide on Web Application Firewall, Q2 2018, is a detailed guide that helps you understand the 33 criteria developed by Forrester for evaluating web application firewall vendors. 

In this evaluation Forrester has identified 10 most significant ones - Akamai Technologies, Amazon Web Services, Barracuda Networks, Cloudflare, F5 Networks, Fortinet, Imperva, Positive Technologies, Radware and Rohde &…

Continue

Added by CISO Platform on August 8, 2018 at 3:00pm — No Comments

(20 Page Guide) Critical Capabilities For Evaluating WAF - Web Application Firewall

With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can take to protect themselves from breaches and secure their customers.…

Continue

Added by CISO Platform on July 25, 2018 at 12:00pm — No Comments

India Security Technology Adoption Report 2018

Security Technology Adoption Report 2018 is a study by CISO Platform in association with FireCompass. This survey was conducted online and the results discussed in the report are based on the responses of CISO’s across the country. There are more than 395 data points from across the country.…

Continue

Added by CISO Platform on July 10, 2018 at 3:00pm — No Comments

Top 3 Misconceptions About the Deep Web & What CISOs Need to Know

Deep Web is the internet that cannot be accessed through standard search engines or the pages that are not indexed in any way.

Top 3 Misconceptions About the Deep Web

Deep Web & Dark…

Continue

Added by CISO Platform on April 19, 2018 at 5:00pm — No Comments

Top 10 CISO Focus on Security Technology for 2018

2018 started with our community meets for Security Priority Planning for 2018.. and through our live survey we gathered some interesting insights. Technologies that are part of Key Focus Area for a CISO in 2018 are Security Analytics, SOC Implementation/ Upgradation, 3rd Party Risk Management, Awareness & Education, Vulnerability Management, Managing Advanced & Targeted Threats, Threat Intel Program, Incidence Response Program, Cloud Virtualization, Privacy, Cyber Resilience…

Continue

Added by CISO Platform on January 30, 2018 at 3:30pm — No Comments

Top 10 Emerging Security Technologies in 2018

Top 10 Emerging Technologies in 2018:

2018 started with our community meets for Security Priority Planning for 2018.. and through our live survey we gathered some interesting insights. Most votes (in percentage) were for network behaviour analytics, Security Orchestration, Cyber Risk Insurance, Secure DevOps & UEBA(User & Entity Behaviour Analytics). Technologies like MDR, Deception, Container Security,…

Continue

Added by CISO Platform on January 30, 2018 at 3:00pm — No Comments

Gartner Magic Quadrant for Enterprise Mobility Management 2017

Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint strategies, must maintain focus on near- and long-term goals in this dynamic segment. 

>> …

Continue

Added by CISO Platform on September 5, 2017 at 3:30pm — No Comments

Complete Guide To Log & Event Management (by Anton Chuvakin Gartner)

Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies but also on architecting their joint deployments. In addition, he will provide recommendations for companies…

Continue

Added by CISO Platform on August 18, 2017 at 12:30pm — No Comments

eBook : Deception 2.0 for Dummies

Deception is a very useful and effective tactic to detect and evade threats in many situations. The modern cybersecurity situation is one such example.

This book explains cybersecurity deception and technologies in six short chapters which includes:…

Continue

Added by CISO Platform on August 18, 2017 at 12:00pm — No Comments

Launching Top Security Vendor Awards - Solely Based On User Reviews on FireCompass

Today buying has become more social & buyers want to know what their peers or what other buyers & users are saying about it. FireCompass thinks it is indeed a very great achievement when your buyers love your product and we want to help you spread that…
Continue

Added by CISO Platform on July 13, 2017 at 5:00pm — No Comments

Announcing Pre-Registrations@ SACON 2017: Security Architecture Conference

Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.

Agenda Highlights: SACON 2017 aims to…

Continue

Added by CISO Platform on July 7, 2017 at 5:30pm — No Comments

Ransomware Response Guide

The document is intended to be a guide for organizations faced with a ransomware infection. This guide is split into several sections, with the most critical and time-sensitive being in the initial response section. 

If you are currently experiencing a ransomware incident, it is highly recommended you immediately review the containment section below, and return to this section at a later time for an overall background of ransomware.…

Continue

Added by CISO Platform on May 16, 2017 at 6:30pm — No Comments

Gartner Magic Quadrant for Security Information and Event Management

This report gives you a broad view on the present technology providers and their relative position. The Magic Quadrant report positions technology players within a specific market. It brings together the major competing technology providers along with emerging, established and niche technology providers. 

The evaluation criteria along with graphical representation help ones rapidly ascertain the technology providers and their performance in the…

Continue

Added by CISO Platform on May 2, 2017 at 11:00pm — No Comments

Top 7 Things to do: Legal Aspects in Cyber Crisis Management (for Banks)

Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity during further investigation. The below guidelines need to be followed to avoid legal complexity.

Top 7 Things to do:

  • Affected every electronic evidence will be…
Continue

Added by CISO Platform on April 29, 2017 at 10:40pm — No Comments

4 Phases of Cyber Crisis Management

There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases. 

 

>>Get the Complete Report on Crisis Management…

Continue

Added by CISO Platform on April 29, 2017 at 10:00pm — No Comments

Top 5 Enterprise Security Architecture Measurement Categories

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass

Architecture Measurement…

Continue

Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments

Executive Summary to Build Enterprise Security Architecture Governance Program

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…

Continue

Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments

2016 Summary Report: Top 10 Trends in Exploits & Security Intelligence

The 2016 trends in cybersecurity report talks about the top 10 trends and stats that matter most to security and enterprise leaders. Its imperative to stay on top of security concerns in today's changing world.

What's in the Report? 

  • Study & Analysis of Exploits, 6000+ Vulnerabilities disclosed in 2016…
Continue

Added by CISO Platform on December 28, 2016 at 1:30pm — No Comments

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts