Pritha's Blog – January 2015 Archive (9)

Top Information Security Checklists, Guides and Articles that our members loved the most !





2014 has been a great year at CISO Platform. We had around 1500 new senior executives joining the platform and published 120 new articles on security. Here are some of the best ones from 2014.

Top Security Checklists & Guides:
 …
Continue

Added by pritha on January 31, 2015 at 6:00pm — No Comments

5 Real ways to destroy business by breaking SAP Applications

Watch Video:

5 Real ways to destroy business by breaking SAP Applications

Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

Hacking Exposed:Why Current Security Solutions Fail

Here is an interesting webinar on the 'Insecurities of Security Products'. More often we consider the security vulnerabilities in products apart from security products. It is ironic how a product devised to provide security can also make you more susceptible to compromise. How-So will be demonstrated through a few examples.

3 Industry experts had joined us in this webinar-

  • Stuart McClure, Ex-CTO at McAfee & Lead author of 'Hacking…
Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

BadUSB — On accessories that turn evil by Karsten Nohl

Watch Talk:

(Read more:  5 Best Practices to secure your Big Data Implementation)

BadUSB — On accessories that…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

Ants and Elephants in the CISO's Office

Watch Video:

(Read more:  Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)

Ants and Elephants in the…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

Microsoft vs Apple: Which OS is more secure?

Contrary to the common man belief that 'Windows is very insecure', Microsoft has been very proactive in security. Apple iOS has a great deal of security too, it is described in its building from scratch in the iOS security document. Here are the few points I found great for mention. Here's a small video which has the debate on.

Watch video[9 min]:…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

5 Major Types Of Hardware Attacks You Need To Know

From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar discussing the hardware threats.

Part 1: Major Hardware Attacks…

Continue

Added by pritha on January 13, 2015 at 6:00pm — No Comments

Learning Practical Forensics-Tools & Techniques

A concise primer to Forensics for a beginner or a security expert- an insight into actual solution achieved through Forensics. The problem states a PGP message intercepted by an RAT and needs to be decrypted without the actual key? The process is briefly defined by the expert himself and takes us through a Forensic lab without the pain ofcourse. 

Part1 :Forensics Video Recording…

Continue

Added by pritha on January 13, 2015 at 5:00pm — No Comments

OS Security Evolution & Latest Attack Vectors

Watch Video: (Webinar) OS Security & Latest Attack Vectors

(Read more:  Top 5 Big Data Vulnerability Classes)

Quick…

Continue

Added by pritha on January 13, 2015 at 5:00pm — No Comments

Monthly Archives

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts