bikash
  • Male
  • bangalore
  • India
  • iViZ Security
Share on Facebook

Bikash's Friends

  • Ravi Shankar
  • G Venkataraman
  • Suresh A Shan SAS
  • Shivkumar Pandey
  • Tushar Kanchan
  • Priyanka Aash
  • Bharat Panchal
  • K S Narayanan
  • Ashish Chandra Mishra
  • Harish Babu
  • Sachin Jain
  • Sharad Sadadekar
  • Lopa Mudra Basu
  • Sharat AIRANI
  • CISO Platform

bikash's Discussions

Microsoft releases IE patch for XP even thought support for XP has been discontinued... http://ow.ly/wnMWr

Started May 2, 2014 0 Replies

Microsoft releases IE patch for XP even thought support for XP has been discontinued... http://ow.ly/wnMWrContinue

 

bikash's Page

Profile Information

Company
iViZ Security

Bikash's Blog

Using 80/20 rule in Application Security Management

Posted on February 20, 2016 at 2:30pm 0 Comments

80/20 rule (also known as Pareto Principle) is one of the most beautiful rules which helped me to achieve as well as fail. In most of the cases where I went wrong it finally turned out to be figuring out the “right few”. This is probably one of the most elusive rules. It is easy to understand but extremely difficult to practice.

#1: Know yourself before your enemy does.

I remember in a recent conference the speaker asked the audience…

Continue

4 Areas where Artificial Intelligence Fails in Automated Penetration Testing

Posted on February 20, 2016 at 2:30pm 0 Comments

Formal Modeling and Automation is one of the things I love. I try to model everything and sometimes modeling helps and sometime it lands me in trouble. It helped me when I tried to model Penetration Testing and worked with my co-founder to design our first version of automated Penetration Testing Tool at iViZ. Where it did…

Continue

10 questions to ask before you start your Bug Bounty program…

Posted on February 20, 2016 at 2:30pm 0 Comments

Bug bounty programs are quite common these days with several of the biggest names in the industry have launched various avatars of the program. I have been asked by a few security managers and managements about should they launch a bug bounty program. Definitely bug bounty program has the advantage of crowd sourcing. However an organization should be mature and prepared enough to launch such a program. Here are some questions which shall tell you if you are prepared or not. You are ready…

Continue

Checklist To Assess The Effectiveness Of Your Vulnerability Management Program

Posted on February 20, 2016 at 2:30pm 0 Comments

From our experience of helping organizations in building their ‘Vulnerability Management’ program, we feel that one of the major challenge the security manager/management faces does not always know the reality on the grounds. Obviously the management is extremely busy and has got too many priorities. It is natural to get into managing whirlwinds. So, I wanted to define a few questions which can help you to find out how robust is your application security management program? Not just that, by…

Continue

Comment Wall

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

  • No comments yet!
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service