March 2013 Blog Posts (5)

5 of the most famous hackers!!!

The Internet has plenty of crackers, known as  "black hats", who work to exploit computer systems.You also have white hats. When hackers are hired by companies to do penetration testing, it's legal and known as white hats. In this section we profile five of the most famous  and all time favourite "black hat"…


Added by CISO Platform on March 29, 2013 at 9:00am — 2 Comments

Compliance and Government Regulations

Due to financial implications caused by several recent high-profile data leakage incidents,enterprises are facing increasing pressure for implementation of stringent norms pertaining to governance and compliance reporting. Today, adhering to governmental and contractual compliance requirements is required not only to continue the business, but also generate value. Failure…


Added by CISO Platform on March 21, 2013 at 3:00pm — No Comments

Data Security: The Next Big Security Focus in India ?

Data explosion and advent of big data are phenomena, which are a result of economic development of

nations and increase in digital footprint of organizations.With more and more devices getting connected to the core business enterprise network, in order to serve the need of anytime-anywhere information access and growing traction of bring your own device (BYOD) in the corporate culture; all contributing to the era of ‘big data’.…


Added by CISO Platform on March 19, 2013 at 1:00am — No Comments

Tips for Vendor Management

One of the most important functionality which we do in our day to day work is Vendor Management,or should I say how to do it effectively. Here are a few tips which I would recommend and if needed you can add as well:

1.Always do a thorough check of the Vendor project's, background,or have cross reference check through a reliable source before assigning a…


Added by Melwyn Rebeiro on March 16, 2013 at 4:30pm — 2 Comments

BYOD Security

Does anybody succesfully implemented any BYOD Security Policy in his/her organization? Can he / she share the implemented policy and methodology / techniques / technology and challenges he / she faced ?

Added by Pulak Kumar Tarafder on March 15, 2013 at 11:51am — 2 Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service