Blog Posts

Millions Fined for British Airways And Marriott Data Breach

Posted by CISO Platform on July 11, 2019 at 3:30pm 0 Comments

The Marriott fine of $ 124 Million comes right after a record fine of $230 million imposed by ICO on Monday following the British Airways Data Breach. The ICO's investigation found that the British Airways breach exposed personal data for 500,000 customers. It involved attackers installing malicious code on British Airways's site that rerouted customers to a phishing site that stole their personal details and payment card details.…

Continue

Webinar: 5 Shocking Results From Hidden Internet - Exposed Database,Leaked Passwords, Code Leaks & more

Posted by pritha on April 26, 2019 at 5:30pm 0 Comments

In recent past there have been some major breaches and some key reasons responsible for the breach were Shadow IT, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches happened, like American Express, Uber, Dropbox, Dunkin Donuts, British Airways & many more. FireCompass product & their research team continouosly monitor the web (surface,deep,dark) to understand the leaked credentials, pattern of data loss etc... this…

Continue

100 Top Security Influencers To Follow In 2019

Posted by CISO Platform on December 11, 2018 at 4:30pm 0 Comments

We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 4 categories – CISO, Tech Leaders, Ethical Hackers and Media/Analyst. 

As a part of our …

Continue

Checklist: Litmus Test & Beyond for Cyber Security Incident

Posted by Milind Rajhans on September 3, 2018 at 8:00pm 0 Comments

The cyber incident of the Coop Bank heist of over Rs. 94 Cr compromised to cyber-criminals is a “wake-up” call not only for the entire Banking Sector but every technology services company and OEMs, resulting organizations are taking necessary action to protect their Information Technology Infrastructure, with an intention to reduce the Information Security risk and at the same time working on how to mitigate reputation risk at their respective…

Continue

Executive Summary to Build Enterprise Security Architecture Governance Program

Posted by CISO Platform on April 29, 2017 at 9:00pm 0 Comments

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…

Continue

(20 Page Guide) Critical Capabilities For Evaluating WAF - Web Application Firewall

Posted by CISO Platform on July 25, 2018 at 12:00pm 0 Comments

With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can take to protect themselves from breaches and secure their customers.…

Continue

Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

Posted by pritha on July 2, 2015 at 12:30am 0 Comments

Incident Response is pretty much the same, however the first few hours can be vital and only high priority actions can save the situation. Since this is a Security Breach, it is of highest priority and must be treated at highest escalation level.

Checklist To Respond To A Security…

Continue

Top 10 talks on Cloud Security & Virtualization from RSA Conference USA 2018

Posted by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am 0 Comments

We have handpicked the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions,…

Continue

Top 7 talks for Analytical Intelligence & Response from RSA Conference USA 2018

Posted by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am 0 Comments

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees…

Continue

CISO Guide: Surface Web, Deep Web and Dark Web - Are they different?

Posted by Y R Chandra Sekhar Varma on April 19, 2018 at 11:30am 0 Comments

There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through search engines or standard means. Deep Web is the internet that cannot be accessed through standard search engines or the pages that are not indexed in any way.…

Continue
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service