Forum

Wanted To Get Feedback on Arcon, for Privilege Account/Access management

Started by CISO Platform. Last reply by CISO Platform Sep 4. 1 Reply

Anyone using Arcon, for Privilege Account/Access management? Wanted to get feedback? (question posted on behalf of a CISO member) Continue

Has anybody tested Forescout solution to identify the complete repository of IT Inventory?

Started by CISO Platform. Last reply by CISO Platform Sep 2. 3 Replies

Hello, has anybody tested Forescout solution to identify the complete repository of IT Inventory? How successful it is and what were your observations?  (question posted on behalf of a CISO member) Continue

Need to know how some of you manage vendor security assurance.

Started by CISO Platform. Last reply by Sanjivan S Shirke Aug 30. 2 Replies

Hi, wish to know how some of you manage vendor security assurance. One model I observe as emerging is, having a common platform and avoiding redundant efforts. Some players like Helios, KY3P offer this as service. What's your take and have any of…Continue

Please let me know if organizations have deployed EDR

Started by CISO Platform. Last reply by Srinivasa Rao P Aug 24. 4 Replies

Please let me know if organizations have deployed EDR (question posted on behalf of a CISO member) Continue

Need Feedback on DNIF SIEM Tool

Started by CISO Platform. Last reply by Srinivasa Rao P Aug 24. 3 Replies

Anyone using DNIF SIEM Solution, any feedback?(question posted on behalf of a CISO member) Continue

Can any body suggest an alternative more or less similar to the Winmagic ..Need around 7000 licenses

Started by CISO Platform. Last reply by CISO Platform Aug 22. 4 Replies

For Disk and pendrive encryption we were using Winmagic since 2013. But the company in Asia operation going to close shortly. Can any body suggest an alternative more or less similar to the Winmagic ..Need around 7000 licenses.(question posted on…Continue

Blog Posts

Learn More About the Key Use Cases Of Network ATP Technology

Posted by CISO Platform on September 4, 2019 at 12:37pm 0 Comments

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.

Advance threat protection is not about a single security solution, It is about a combination of security…

Continue

How to choose your Security / Penetration Testing Vendor?

Posted by CISO Platform on September 3, 2019 at 9:30am 0 Comments

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization. Another reason to hire a security testing company is that one may find it difficult to hire and retain Penetration Testers.…

Continue

Top 10 SIEM Log Sources in Real Life?

Posted by Dr. Anton Chuvakin on August 27, 2019 at 4:00am 0 Comments

[cross-post from Anton on Security blog]

One of the most common questions I received in my analyst years of…

Continue

[Security Operations Analysis] Chapter 2: Information Security Incident Response

Posted by Mohamed marrouchi on August 23, 2019 at 6:30pm 0 Comments

Hi CISO This is the Chapter 2 Information Security Incident Response. It is a part of Security Operations Analysis - Crowdsourcing eBook on Peerlryst - Click Here

Abstract

Identifying and responding…

Continue

How to Manage Security & Third Party/Open Source Code in the SDLC

Posted by Drew Brown on August 15, 2019 at 7:30pm 0 Comments

Background:

It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.



With any security program, the goal is to identify the vulnerabilities, the related risks, mitigations or compensating controls that can be implemented. With the volume of development including libraries and binaries from third-party/open source repositories like: Git-Hub,…

Continue

The Legal Case for Capital One AWS Security Breach + A Short Synopsys

Posted by CISO Platform on August 6, 2019 at 12:30pm 0 Comments

Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers ... The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened.

The legal case built was quite interesting. Before I share the legal case link heres a short summary just in-case you dont know…

Continue

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

Posted by CISO Platform on August 4, 2019 at 9:00am 0 Comments

This is a summary of the panel discussion at Security Symposium & Cyber Sentinel Award by Infocon global. The panel discussion was moderated by Jitendra Chauhan (Head of Engineering at FireCompass) along with Balaram (CISO, Manthan), Ananth Kumar Ms (Head-IT Assurance & Security, Janalaxmi Financial Services), Sumanth Naropanth and Ramakrishna Roy.…

Continue

BEWARE OF CARDLESS ATM HACK

Posted by Davin A Jackson on August 2, 2019 at 7:30pm 0 Comments

Phishing attack allows attackers to steal user’s credentials

By now I am sure we have all seen the commercials of people walking up to their ATMs and taking cash out without physically touching the ATM machine. It is a feature known as “Cardless ATM banking” and has been adopted and used by several banking and financial institutions who boast about the faster transaction times (about 15 seconds from start to finish). Cardless ATM allows banking…

Continue

(Breach) NASA Hacked : Why It Happened & What Can You Learn?

Posted by pritha on July 11, 2019 at 1:13pm 0 Comments

(NASA Hacked) On 21 June, 2019 major news channels disclosed a major hack on NASA. Hackers were able to gain unauthorized access using Raspberry Pi and stole ‘Mars Mission Data’ and breached ‘NASA’s satellite dish network’. This happened around April 2018 and went unnoticed for for almost a year. It is advisable to do an attack surface analysis for an organization to have a know-how of all the access and assets.…



Continue

Best Of The World Webinar : Dark Future Of Privacy By Menny Barzilay

Posted by pritha on July 25, 2019 at 1:00pm 0 Comments

How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can systems today analyze people’s behavior to the point where they can predict every move they’ll make?

Watch Webinar : …

Continue
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service