March 2015 Blog Posts (6)

How do you Measure Information Security in your Organisation?

What is your Information security posture? Is there a way to put a measurable score for information security? Can I set a SMART Infosec KPI? If these questions ever crossed your mind, then you are probably at the right place.

I try to address these questions by creating a Score Card for Information Security. Let's start with a Basic framework by collating all the Infosec related activities we do or wish to do to improve our confidence on our Systems and Processes. Allocate a weight to…


Added by Rahul on March 27, 2015 at 9:28pm — No Comments

Advanced Threats In The Enterprise

Watch Video: (Webinar) "Advanced Threats In The Enterprise"

( Read more:  Checklist to Evaluate a DLP Provider )

What will you…


Added by Sagar k on March 27, 2015 at 2:30pm — No Comments

SAP NetWeaver ABAP Security Configuration Part 4: Open remote management interfaces

Today we are going on with our series of articles where we describe the 33 steps to security. The subject is of great significance not only to a small group of SAP infosec specialists, but to all those people who work with ERP systems as recent years have witnessed an increased awareness of business data protection problems. Not to go into details, let us get right to the topic. 

The SAP NetWeaver platform includes not only the Dispatcher service…


Added by Alexander Polyakov on March 26, 2015 at 3:00pm — No Comments

Risks and Opportunities provided by Cyber Domain and Policy-needs to address the Cyber Defense

The term ‘Cyber Domain’ has been used widely by various experts, sometimes interchangeably with ‘Cyber Space’, to imply – “the global domain within the information environment that encompasses the interdependent networks of information technology infrastructures, including the internet and telecommunication networks” (Camillo & Miranda, 2011). Today it has become “the fifth domain of warfare after land, sea, air and space and its a challenge to have a common definition of cyber Domain”…


Added by Sandeep Mittal, IPS on March 17, 2015 at 9:00am — No Comments

Intelligence Driven Security - SIEM & Beyond

Watch Video: (Webinar) Intelligence Driven Security - SIEM & Beyond

( Read more:  Checklist to Evaluate a DLP Provider )

What will you…


Added by CISO Platform on March 16, 2015 at 11:30am — No Comments

Pre-launch Preview: State of Security Technology Adoption in Enterprises - Annual Report 2015

We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking, in which 410 companies have participated in the enterprise segment. This is a preview of the key findings on the implementation of various security technologies.

The data has been collected through the survey conducted online through the "5th Top 100 CISO Awards,…


Added by CISO Platform on March 12, 2015 at 5:30pm — No Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service