Forum

Can any body suggest an alternative more or less similar to the Winmagic ..Need around 7000 licenses

Started by CISO Platform. Last reply by CISO Platform 23 hours ago. 4 Replies

For Disk and pendrive encryption we were using Winmagic since 2013. But the company in Asia operation going to close shortly. Can any body suggest an alternative more or less similar to the Winmagic ..Need around 7000 licenses.(question posted on…Continue

Need Feedback on DNIF SIEM Tool

Started by CISO Platform. Last reply by CISO Platform 23 hours ago. 2 Replies

Anyone using DNIF SIEM Solution, any feedback?(question posted on behalf of a CISO member) Continue

Need help to know the emergency notifications tool like send word now

Started by CISO Platform 23 hours ago. 0 Replies

 Hi friends, need your help to know the emergency notifications tool like send word now (question posted on behalf of a CISO member) Continue

Please let me know if organizations have deployed EDR

Started by CISO Platform. Last reply by CISO Platform 23 hours ago. 3 Replies

Please let me know if organizations have deployed EDR (question posted on behalf of a CISO member) Continue

Using a certain DLP vendor, systems have become slow.. DLPs vendors which are better optimised to perform

Started by CISO Platform. Last reply by CISO Platform 23 hours ago. 6 Replies

Once we started using a certain DLP vendor, systems have become slow.. Do you have experience with DLPs which are better optimised to perform even with lesser computational resources?  Also How Good is their support Post Implementation? (question…Continue

Tags: DLP

Need Professional Help from Renowned Assignment Provider - BookMyEssay

Started by Oliver Mark yesterday. 0 Replies

The writers associated with BookMyEssay understands how much challenging the situation becomes for a student when he needs to tackle a tough assignment. So, when marks in the assignments matter, it is always a good decision to take…Continue

Tags: help, assignment, management

Blog Posts

How to Manage Security & Third Party/Open Source Code in the SDLC

Posted by Drew Brown on August 15, 2019 at 7:30pm 0 Comments

Background:

It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.



With any security program, the goal is to identify the vulnerabilities, the related risks, mitigations or compensating controls that can be implemented. With the volume of development including libraries and binaries from third-party/open source repositories like: Git-Hub,…

Continue

The Legal Case for Capital One AWS Security Breach + A Short Synopsys

Posted by CISO Platform on August 6, 2019 at 12:30pm 0 Comments

Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers ... The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened.

The legal case built was quite interesting. Before I share the legal case link heres a short summary just in-case you dont know…

Continue

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

Posted by CISO Platform on August 4, 2019 at 9:00am 0 Comments

This is a summary of the panel discussion at Security Symposium & Cyber Sentinel Award by Infocon global. The panel discussion was moderated by Jitendra Chauhan (Head of Engineering at FireCompass) along with Balaram (CISO, Manthan), Ananth Kumar Ms (Head-IT Assurance & Security, Janalaxmi Financial Services), Sumanth Naropanth and Ramakrishna Roy.…

Continue

BEWARE OF CARDLESS ATM HACK

Posted by Davin A Jackson on August 2, 2019 at 7:30pm 0 Comments

Phishing attack allows attackers to steal user’s credentials

By now I am sure we have all seen the commercials of people walking up to their ATMs and taking cash out without physically touching the ATM machine. It is a feature known as “Cardless ATM banking” and has been adopted and used by several banking and financial institutions who boast about the faster transaction times (about 15 seconds from start to finish). Cardless ATM allows banking…

Continue

(Breach) NASA Hacked : Why It Happened & What Can You Learn?

Posted by pritha on July 11, 2019 at 1:13pm 0 Comments

(NASA Hacked) On 21 June, 2019 major news channels disclosed a major hack on NASA. Hackers were able to gain unauthorized access using Raspberry Pi and stole ‘Mars Mission Data’ and breached ‘NASA’s satellite dish network’. This happened around April 2018 and went unnoticed for for almost a year. It is advisable to do an attack surface analysis for an organization to have a know-how of all the access and assets.…



Continue

Best Of The World Webinar : Dark Future Of Privacy By Menny Barzilay

Posted by pritha on July 25, 2019 at 1:00pm 0 Comments

How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can systems today analyze people’s behavior to the point where they can predict every move they’ll make?

Watch Webinar : …

Continue

Webinar: 5 Shocking Results From Hidden Internet - Exposed Database,Leaked Passwords, Code Leaks & more

Posted by pritha on April 26, 2019 at 5:30pm 0 Comments

In recent past there have been some major breaches and some key reasons responsible for the breach were Shadow IT, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches happened, like American Express, Uber, Dropbox, Dunkin Donuts, British Airways & many more. FireCompass product & their research team continouosly monitor the web (surface,deep,dark) to understand the leaked credentials, pattern of data loss etc... this…

Continue

100 Top Security Influencers To Follow In 2019

Posted by CISO Platform on December 11, 2018 at 4:30pm 0 Comments

We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 4 categories – CISO, Tech Leaders, Ethical Hackers and Media/Analyst. 

As a part of our …

Continue

Checklist: Litmus Test & Beyond for Cyber Security Incident

Posted by Milind Rajhans on September 3, 2018 at 8:00pm 0 Comments

The cyber incident of the Coop Bank heist of over Rs. 94 Cr compromised to cyber-criminals is a “wake-up” call not only for the entire Banking Sector but every technology services company and OEMs, resulting organizations are taking necessary action to protect their Information Technology Infrastructure, with an intention to reduce the Information Security risk and at the same time working on how to mitigate reputation risk at their respective…

Continue

Executive Summary to Build Enterprise Security Architecture Governance Program

Posted by CISO Platform on April 29, 2017 at 9:00pm 0 Comments

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…

Continue
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service