CISO Platform's Blog (117)

Bitcoin Transaction Malleability: An Insight

Bitcoin Transaction Malleability, an Insight by Daniel Chechik.The bitcoin network vulnerability had disturbed the huge bitcoin network. Plenty trading websites like Silk Road,MTGox and more have been victim to "Bitcoin Transaction Malleability." This talk will take you through the vulnerability and how exactly it may be exploited.…



Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

Cyber Safety in Cars and Medical Devices

Cyber Safety in Cars and Medical Devices by Beau Woods, creator of IOT Security Framework. We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life and safety systems, bits and bytes meet flesh and bone. We must know, not just hope, that devices with the ability to impact human life and public safety are worthy of our trust. Learn how the safety impacts of merging cyber security with cars and…

Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

More Shadow Walker The Progression of TLB Splitting On X86 Jacob Torrey

This talk will cover the concept of mis-using the hardware (x86 translation lookaside buffer) to provide code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware. After requisite background is provided, the talk will then move to the new research, the author's method for splitting a TLB on Core i-series and newer processors and how it can again be used for defensive (MoRE…

Continue

Added by CISO Platform on December 19, 2014 at 2:00am — No Comments

6 Key Principals for creating a Secure Cloud

Securing a cloud environment requires, and offers a new approach to security: holistic Security Intelligence. Many organizations have dozens of different point products to address security concerns. For example, they may have a firewall from one vendor, identity management from another, and application scanning from a third. This creates a siloed approach to security. However, as attacks become both more complex and sophisticated, it has become a priority to look across all of these…

Continue

Added by CISO Platform on December 4, 2014 at 3:30pm — No Comments

5 Key Benefits of Source Code Analysis

Static Code Analysis: Binary vs. Source

Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. According to Gartner’s 2011 Magic Quadrant for Static Application Security Testing (SAST), “SAST should be…

Continue

Added by CISO Platform on December 2, 2014 at 7:00pm — No Comments

Source Code Analysis- How to Remediate your Vulnerabilities

The AppSec How -To:Visualizing and Effectively Remediating Your Vulnerabilities: The biggest challenge when working with Source Code Analysis (SCA) tools is how to effectively prioritize and fix the numerous results. Developers are quickly overwhelmed trying to analyze security reports containing results that…

Continue

Added by CISO Platform on December 2, 2014 at 4:00pm — No Comments

10 Steps to Secure Agile Development

In Agile’s fast-paced environment and frequent releases,security reviews and testing sound like an impediment to success. How can you keep up with Agile demands of continuous integration and continuous deployment without abandoning security best practices? 

Companies have found the following ten practices helpful to achieve a holistic secure…

Continue

Added by CISO Platform on December 1, 2014 at 4:30pm — No Comments

Your Guide to Multi-Layered Web Security

Why Read This Report

The data center perimeter is dead. But its memory lives on in the way many IT departments continue to secure their infrastructure. The meteoric rise of the Internet brought with it an ever-changing landscape of new attacks and completely disrupted organizations’ old models of guarding their IT infrastructure. Previously, information assets that needed protection all resided in a fortress…

Continue

Added by CISO Platform on November 18, 2014 at 10:30pm — 1 Comment

Launching Community based "Common Framework for Security Technology Evaluation" @ Annual Summit,2014

Why do we need a common security technology evaluation framework? 

Floating an RFP (Request for Proposal)  or evaluating a new technology for a CISO is a substantial effort. Going through the sea of data  and marketing buzz to judge a vendor and its product is…

Continue

Added by CISO Platform on September 3, 2014 at 9:30pm — No Comments

Bypass Firewalls, Application White Lists, Secure Remote Desktops in 20sec

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:30am — No Comments

Detecting & Defending Against State-Actor Surveillance

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Check your Fingerprints: Cloning the Strong Set

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

From ROOT to Special: Hacking IBM Mainframes

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Easy to Use Phone DDOS

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

One-Man Shop: How to Build a Functional Security Program with Limited Resources

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

From Raxacoricofallapatorius With Love: Case Studies in Insider Threats

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

RF Pentesting Your Air Stinks

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Adventures in Disruption, Destruction & Death

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Cyber-hijacking Airplanes

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Attacking the Internet of Things

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2019   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts