Social Network For CISO (Chief Information Security Officers)
Information Security Metrics and Dashboard fo
It is very important to…
At a recent industry event discussing security, a question was rasised as to who needs to take ownership of security issues, the comment was made that it needs to be "someone senior enough to…Blog How would you describe the CISO role on Twitt 1 Like Announcing CISO Handbook: A Call to Authors
There is a common misconception that cyber criminals and hacktivists only target large enterprises to reap a bumper. The reality is actually very different, recently published surveys…Blog Tackling the Cyber Security challenges faced 3 Likes
Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?
In my personal journey, I adopted Magic first and later got acquainted with…Blog Magic, Hacking and Kevin Mitnick 1 Like Interview Series: A CTO perspective on BIG Da
Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the…Blog Interview Series: A CTO perspective on BIG Da 3 Likes
Saurabh Kaushik,Sr Manager Information Security, Lupin Pharma, talks to CISO Platform on the biggest drivers and barriers of IAM adoption and the top…
We have developed the myth that technology can be an effective fortress – We can have security.…Blog Changing Landscape of IT Security. How should 6 Likes Weekly Top 10 security news (4th-feb-10th-fe… Bit9 hacked, used to inject malware into customers' networks Security vendor Bit9 has been hit by a serious security breach of its own network.Intruders broke into a core part of the company… Page Weekly Top 10 security news (4th-feb-10th-fe… 1 Like Top 10 Security News-weekly Group Top 10 Security News-weekly 5 Likes Is it CISO responsibility to take care of sec
Is CISO responsible for secure cording or it should be handled by quality fuction.Blog Is it CISO responsibility to take care of sec 8 Likes Business Logic Vulnerabilities-The Biggest C… event Business Logic Vulnerabilities-The Biggest C… 1 Like How MIT website got hacked despite having any
MIT got hacked.Anonymous defaced the MIT to protest against the case of “Aaron Swartz”.
Without getting into who really hacked or the…Blog How MIT website got hacked despite having any 4 Likes Database Threats 101: SQL Injection video Database Threats 101: SQL Injection 2 Likes Blackhat 2012 EUROPE - Finding Needles in H… video Blackhat 2012 EUROPE - Finding Needles in H… 3 Likes
Top 10 predictions for 2013 and beyond - Gartner…
Gartner Predicts 2013 Local Briefing – Bangal