Blog Posts

What Google Is To Most Internet Users, Shodan Is To Hackers

Posted by Allan Gray on January 14, 2020 at 2:00pm 0 Comments

What Google is to most internet users, Shodan ( is to hackers. It is a search engine for hackers to look for open or vulnerable digital assets. Shodan scans the entire internet and…



Posted by CISO Platform on December 30, 2019 at 12:00pm 0 Comments

Call for Comments

1. Need for NCSS 2020 India was one of the first few countries to propound a…

Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk

Posted by Matthew Rosenquist on December 31, 2019 at 1:00pm 0 Comments

Cybersecurity will be hard pressed to take on the new challenges of bank managed digital…


9 Critical Capabilities For Digital Risk Protection Program

Posted by CISO Platform on October 24, 2019 at 12:41pm 0 Comments

Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%)…


The 7 Most Dangerous Digital Technology Trends

Posted by Matthew Rosenquist on December 27, 2019 at 4:58am 0 Comments

As our world embraces a digital transformation, innovative technologies bring greater opportunities,…


A Dive into CEH

Posted by Prasanna V Balaji on December 13, 2019 at 4:21pm 0 Comments

How do you prepare for CEH ?

The first question that you should ask yourself is why CEH over other certs ?

Apart from CEH being a highly…


What to Look for in a Bug Tracking Tool

Posted by Ray Parker on December 10, 2019 at 4:19pm 0 Comments

Issue tracking can often be a tedious and annoying task. With several bugs happening at the same time, it becomes important to use bug tracking tools for your teams. This has become even more important in today’s…


Dear Security Community, are we doing it right?

Posted by Santosh C on December 9, 2019 at 11:29am 1 Comment

Compliance Vs Security:

Compliance does not always mean you are secure, totally agree. But does not mean Compliance, Standards and Processes are useless, it is not as…


Becoming a Cloud Security Architect - my personal experience

Posted by Dawid Bałut on December 23, 2019 at 8:06pm 0 Comments

A couple of weeks ago I was asked by my colleague to give him some clues and tips on how to become a Cloud Security Architect, as that's the venture he wants to follow and he knows I've been in architect-alike roles for a while.




Need expert opinion on alternate solution of crowdStrike

Started by CISO Platform. Last reply by CISO Platform Aug 9, 2019. 11 Replies

Need your expert opinion for getting alternate solution of crowdStrike (question posted on behalf of a CISO member) Continue

Solution Needed: I want laptop users once they go home and connect to WiFi, it should mandatorily direct traffic to my firewall

Started by CISO Platform. Last reply by Rajan Arora Aug 8, 2019. 11 Replies

Hi,What is the solution if I want all my laptop users once they go home and connect to WiFi they should mandatorily direct traffic to my firewall and we should monitor all website that users access. Also company policy should apply (question posted…Continue


© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service