Blog Posts

(Best Of The World Webinar) Securely Deploying Micro Services, Containers & Serverless PaaS Web Apps

Posted by pritha on June 16, 2019 at 3:00pm 0 Comments

This presentation will address all the relevant information about default security postures achieved by using the -aaS model. This session will be a unique opportunity to hear from Murray Goldschmidt, renowned DevSecOps expert, explaining the key…

Continue

(Webinar) How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Disclosures and more..

Posted by pritha on June 16, 2019 at 3:00pm 0 Comments

Breaches are at all time high. In this webinar learn the do's and don't of handling breach disclosure. Best practices of how to set up a bounty program . How to respond to responsible disclosures? Do's and Don'ts and learning from the…

Continue

Top Learning from RBI & SEBI Cyber Security Framework Circular

Posted by pritha on June 13, 2019 at 12:00pm 0 Comments

RBI & SEBI has recently notified the Banks and Stock Brokers/Depository Participants and published a cyber security framework to be deployed. Here is a consolidated learning compiled by us and you can also access the detailed frameworks from…

Continue

A Guide to Choosing a Next-Generation Firewall

Posted by Meghana P on June 10, 2019 at 2:00pm 0 Comments

Now that we have examined the differences between traditional firewalls and the next generation firewalls (NGFW), let's look at five of the top NGFW solutions from Cisco, CheckPoint, Fortinet, WatchGuard and Dell…

Continue

How to handle breach disclosures? Bug Bounty, Coordinated Vulnerability Disclosures and more...

Posted by pritha on May 23, 2019 at 3:49pm 0 Comments

We wanted to share an alert with all the community members



Yesterday HCL data Breach was made public by a security research organization which is now in news. We wanted to share some best practices on how to handle such…

Continue

Webinar: 5 Shocking Results From Hidden Internet - Exposed Database,Leaked Passwords, Code Leaks & more

Posted by pritha on April 26, 2019 at 5:30pm 0 Comments

In recent past there have been some major breaches and some key reasons responsible for the breach were Shadow IT, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches happened, like…

Continue

A Cautionary Tale about Next Generation Firewalls…

Posted by Meghana P on April 4, 2019 at 2:27pm 0 Comments

Businesses and organizations are fielding more & more next-generation Information Security technologies to reduce their risks as businesses leverage cloud capabilities and from advanced persistent…

Continue

Threat Intelligence - Do We Understand It ?

Posted by Aditya Khullar on March 12, 2019 at 11:30am 0 Comments

Threat Intelligence - It is the one word we all have heard various times recently. The subject has been under constant scrutiny for a while now, but do we understand it? Moreover, since it has been viewed very differently from different…

Continue

A Basic Guide To Update & Prepare For CESG - CAS(T)

Posted by Manoj Vakekattil on March 11, 2019 at 1:30pm 0 Comments

BASIC GUIDE TO CESG - CAS(T)

BY: MANOJ VAKEKATTIL

ISO27001:2013LA,CISM,CCNA,MCITP,ITIL-V3 CERTIFIED

OVERVIEW

CESG Assured Services for Telecommunication –CAS(T) …

Continue

DEVSECOPS – THE WHAT, WHY, AND HOW?

Posted by Aditya Khullar on March 11, 2019 at 1:11pm 0 Comments

DevSecOps, or the blending of an enterprise’s applications development with systems operations teams with collaboration of security has become a trendy IT topic. The new operating model is often employed in conjunction with Agile software…

Continue
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts