The first question that you should ask yourself is why CEH over other certs ?
Apart from CEH being a highly…
Social Network For Security Executives: Help Make Right Cyber Security Decisions
A couple of weeks ago I was asked by my colleague to give him some clues and tips on how to become a Cloud Security Architect, as that's the venture he wants to follow and he knows I've been in architect-alike roles for a while.
What Google is to most internet users, Shodan (…Continue
Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%)…Continue
Step 1: Collect all IP addresses that are used to send email
The Sender Policy Framework (SPF) gives the ability to authenticate your email and to specify which IP addresses are allowed to send email on behalf of the…Continue
Children are amongst the most vulnerable in the Cyber world and we believe It is time for us to do something for our next generation.
At CISO Platform community, we…Continue
Generally, security team size would always lean for any type, kind or size of the organization :-), however, we are seeing a change in the trend, thanks to high-profile and increasingly sophisticated…
Need your expert opinion for getting alternate solution of crowdStrike (question posted on behalf of a CISO member) Continue
Hi,What is the solution if I want all my laptop users once they go home and connect to WiFi they should mandatorily direct traffic to my firewall and we should monitor all website that users access. Also company policy should apply (question posted…Continue