Pritha's Blog – June 2017 Archive (6)

Google's BeyondCorp - Components & Architecture (A Quick Summary)

Components of Google BeyondCorp

Device & Hosts

  • Device : Collection of physical & virtual components that act as computer. Eg. PC, Server, VMs
  • Host : Snapshot of a device state at a given point of time. Eg. Device might be a mobile phone, while a host would be specifics of operating system and software running on the…
Continue

Added by pritha on June 24, 2017 at 2:56am — No Comments

Application Threat Modeling : Types Of Threats

Here's a small classification of Types Of Threats In Application Threat Modeling. This was earlier presented in SACON (International Security Architecture Conference) by Nilanjan De [Multiple patents, Zero Day Discovery, Co-Founder at FireCompass]…

Continue

Added by pritha on June 20, 2017 at 12:30pm — No Comments

Comparing SIEM, Big Data & Behavior Analytics - Security Management Solutions

With Big Data and Behavior Analytics advances, the need of an SIEM at the enterprise level may be a question. This question is addressed in this report. It analyses, dissects and tries to find out the pros and cons of both sides.

>> Download…

Continue

Added by pritha on June 14, 2017 at 12:30pm — No Comments

Four Top Cyber Crime Trends - Recurring Trend In Cyber Security Incidents

This report gives insight into 4 key cyber security incident trends observed in 2015. Includes top insights and detailed analysis of each attack and how one could prevent their organisation from being a target as well as mitigation.

>> Download Report…

Continue

Added by pritha on June 14, 2017 at 12:00pm — No Comments

Incident Response : How To Classify Incidents Based On Its Severity ?

Author - Sanjay D. Tiwari, CISO, Suryoday Small Finance Bank

Prioritizing the handling of the incident is perhaps the most critical decision point in the incident handling process.

Incidents should not be handled on a first come, first served basis because of resource limitations. Instead, handling should be prioritized based on severity. Prioritizing incident defines how quickly the addressed incident need to be resolved.

Prioritization based on how quickly an incident to…

Continue

Added by pritha on June 6, 2017 at 7:00pm — No Comments

The Forrester WaveTM: Information Security Consulting Services

In this Forrester's report they identify and analyze 13 significant firms in the IT security consulting services - Accenture, Atos, BAE Systems, Dell SecureWorks, Deloitte, EY, HPE, IBM Security Services, KPMG, Protiviti, PwC, Verizon & Wipro …

Continue

Added by pritha on June 1, 2017 at 5:00pm — No Comments

Monthly Archives

2018

2017

2016

2015

2014

2013

2012

1999

Follow Us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2018   Created by CISO Platform   |   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts