Social Network For Security Executives: Help Make Right Cyber Security Decisions
IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.
On any given day; any organisation can suffer irreparable harm at the hands of cyber- attackers. No organisation is too small or too big for this.
Unfortunately this battle field is not symmetric. The attackers have the clear advantage. Defenders have to protect a wide perimeter…Continue
Added by Sharat AIRANI on April 12, 2013 at 8:00pm — No Comments
Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the future.
What do you think are the top technologies that will…
Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?
In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a product to simulate a human hacker. I believe Magic helped me in Security. Somehow deep in my heart I always believed there is a magician in every hacker.
(Read more: …Continue
Added by bikash on April 4, 2013 at 3:00am — No Comments
The Internet has plenty of crackers, known as "black hats", who work to exploit computer systems.You also have white hats. When hackers are hired by companies to do penetration testing, it's legal and known as white hats. In this section we profile five of the most famous and all time favourite "black hat"…Continue
Due to financial implications caused by several recent high-profile data leakage incidents,enterprises are facing increasing pressure for implementation of stringent norms pertaining to governance and compliance reporting. Today, adhering to governmental and contractual compliance requirements is required not only to continue the business, but also generate value. Failure…Continue
Added by CISO Platform on March 21, 2013 at 3:00pm — No Comments
Data explosion and advent of big data are phenomena, which are a result of economic development of
nations and increase in digital footprint of organizations.With more and more devices getting connected to the core business enterprise network, in order to serve the need of anytime-anywhere information access and growing traction of bring your own device (BYOD) in the corporate culture; all contributing to the era of ‘big data’.…
Added by CISO Platform on March 19, 2013 at 1:00am — No Comments
One of the most important functionality which we do in our day to day work is Vendor Management,or should I say how to do it effectively. Here are a few tips which I would recommend and if needed you can add as well:
1.Always do a thorough check of the Vendor project's, background,or have cross reference check through a reliable source before assigning a…Continue
Does anybody succesfully implemented any BYOD Security Policy in his/her organization? Can he / she share the implemented policy and methodology / techniques / technology and challenges he / she faced ?
Keeping current with the latest threat trends can improve the effectiveness of existing security solutions as it helps to identify and prioritize security gaps that may require new approaches and more innovative strategies.
Added by CISO Platform on February 25, 2013 at 5:30pm — No Comments
Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "…Continue
Added by Priyanka Aash on February 21, 2013 at 6:30pm — No Comments
Organizations across industry verticals shall adopt IAM as it has become the need of the hour.However IAM solution may not be able to address some of the requirements, due to limitations in the features it supports or lack of flexibility to customize.Here are the Top 5 things a CISO should…Continue
Added by Saurabh Kaushik on February 19, 2013 at 4:30pm — No Comments
Saurabh Kaushik,Sr Manager Information Security, Lupin Pharma, talks to CISO Platform on the biggest drivers and barriers of IAM adoption and the top challenges a CISO/organization can face while adopting IAM.
How important is IAM? Why should organizations adopt it?
Identity and Access Management is an integrated set of processes,…Continue
Added by CISO Platform on February 19, 2013 at 3:00pm — No Comments
We have developed the myth that technology can be an effective fortress – We can have security.
Traditional focus on:
Top 10 predictions for 2013 and beyond - Gartner
Gartner's top predictions for 2013 focus on opportunities, economic risks and innovations that will force CIOs to move to the next generation of business-driven solutions."The priorities of CEOs must be dealt with by CIOs who exist in a…
Added by CISO Platform on February 8, 2013 at 9:00am — No Comments
MIT got hacked.Anonymous defaced the MIT to protest against the case of “Aaron Swartz”.
Without getting into who really hacked or the “cause” behind the protest, I just wanted to dissect it as an interesting case of multi-stage attack which proves that just securing your application is not good enough.…Continue
Added by bikash on December 16, 2012 at 9:00pm — No Comments
Added by bikash on November 22, 2012 at 4:30pm — No Comments
(Read more: …
Added by CISO Platform on November 5, 2012 at 2:00pm — No Comments
Is CISO responsible for secure cording or it should be handled by quality fuction.
White Hat Hackers
Hackers that use their skills for good are classified as white hat. These white hats often work as certified Ethical Hackers, hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking…
Added by CISO Platform on July 16, 2012 at 10:30pm — No Comments