Blog Posts

Becoming a Cloud Security Architect - my personal experience

Posted by Dawid Bałut on December 23, 2019 at 8:06pm 0 Comments

A couple of weeks ago I was asked by my colleague to give him some clues and tips on how to become a Cloud Security Architect, as that's the venture he wants to follow and he knows I've been in architect-alike roles for a while.



There is No Easy Fix to AI Privacy Problems

Posted by Matthew Rosenquist on February 9, 2020 at 2:49am 0 Comments

Artificial intelligence – more specifically, the machine learning (ML) subset of AI - has a number of…


What Google Is To Most Internet Users, Shodan Is To Hackers

Posted by Allan Gray on January 14, 2020 at 2:00pm 0 Comments

What Google is to most internet users, Shodan (…


9 Critical Capabilities For Digital Risk Protection Program

Posted by CISO Platform on October 24, 2019 at 12:41pm 0 Comments

Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%)…


A Dive into CEH

Posted by Prasanna V Balaji on December 13, 2019 at 4:21pm 0 Comments

How do you prepare for CEH ?

The first question that you should ask yourself is why CEH over other certs ?

Apart from CEH being a highly…


Dear Security Community, are we doing it right?

Posted by Santosh C on December 9, 2019 at 11:29am 1 Comment

Compliance Vs Security:

Compliance does not always mean you are secure, totally agree. But does not mean Compliance, Standards and Processes are useless, it is not as…


How to create an SPF TXT record?

Posted by Priyank Sheth on December 17, 2019 at 4:00pm 0 Comments

Step 1: Collect all IP addresses that are used to send email

The Sender Policy Framework (SPF) gives the ability to authenticate your email and to specify which IP addresses are allowed to send email on behalf of the…


Progress Report & Volunteers - Kids Cyber Safety 2019

Posted by pritha on November 26, 2019 at 8:30pm 0 Comments

Our Mission

Children are amongst the most vulnerable in the Cyber world and we believe It is time for us to do something for our next generation.

At CISO Platform community, we…


Lean Information Security Team for a Product Organization

Posted by Santosh C on November 26, 2019 at 10:02am 1 Comment

Generally, security team size would always lean for any type, kind or size of the organization :-), however, we are seeing a change in the trend, thanks to high-profile and increasingly sophisticated…



Need expert opinion on alternate solution of crowdStrike

Started by CISO Platform. Last reply by CISO Platform Aug 9, 2019. 11 Replies

Need your expert opinion for getting alternate solution of crowdStrike (question posted on behalf of a CISO member) Continue

Solution Needed: I want laptop users once they go home and connect to WiFi, it should mandatorily direct traffic to my firewall

Started by CISO Platform. Last reply by Rajan Arora Aug 8, 2019. 11 Replies

Hi,What is the solution if I want all my laptop users once they go home and connect to WiFi they should mandatorily direct traffic to my firewall and we should monitor all website that users access. Also company policy should apply (question posted…Continue


© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service