Priyanka Aash
  • bangalore
  • India
  • CISOPlatform
Share on Facebook

Priyanka Aash's Friends

  • G Venkataraman
  • Zahid Ali
  • VISHWAS RUDRAMURTHY
  • Suresh Srinivasan
  • Mahesh Sonavane
  • Tito Gomes
  • shalini singh
  • Yatendra Kumar
  • Shubhangi Walke
  • Vaman Amarjeet G Kini
  • Satish Papnoi
  • Binu Chacko
  • VIVEK DHARIA
  • Sumit Guta
  • Gopinathan K
 

Priyanka Aash's Page

Profile Information

Company
CISOPlatform

Priyanka Aash's Blog

Database Security Framework & Best Practices

Posted on July 13, 2019 at 5:00pm 0 Comments

For database security following framework can be adapted by any organization to ensure database security system established within organization. This has been written by Prakash Sharma.

Database Security Framework…

Continue

Cloud Governance Model - Areas of Risk & Counter Measures Required

Posted on July 4, 2019 at 2:30pm 0 Comments

Cloud computing has transforming businesses across the globe, the entire enterprise infrastructure is moving to the cloud. With accelerating adoption of cloud, organizations are increasing their attack surface and infrastructure security in cloud computing is an issue given the hyper-connected nature of the cloud.

The below checklist has been created by Nitish Goyal,Information Technology Risk Office at Ocwen (many of…
Continue

10 Areas of Risk in Enterprise Cloud Security Controls across Infrastructure

Posted on July 2, 2019 at 2:00pm 0 Comments

Cloud computing has transformed every business across the globe, from basic tools to enterprise applications. The entire enterprise infrastructure is moving to the cloud. With accelerating adoption of cloud, organizations are increasing their attack surface and infrastructure security in cloud computing is an issue given the hyper-connected nature of the cloud.

The below checklist has been created by Nitish…
Continue

5 of the most famous and all time favourite white hat hackers!!!

Posted on February 21, 2013 at 6:30pm 0 Comments

White Hat Hackers

Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "…

Continue

Comment Wall

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

  • No comments yet!
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service