Social Network For Security Executives: Help Make Right Cyber Security Decisions
Our special webinar by CISO Platform and WebSense, was a great success with over 120 CISO's registering for the webinar.
Key Areas Covered
Added by CISO Platform on April 23, 2013 at 1:30am — No Comments
APT (Advanced Persistent Threats) is the talk of the town. There is too much of noise and confusion. Everybody wants to make money. Quite a few uses FUD (Fear Uncertainty and Doubt) to sell their products. I wanted to highlight the APT secrets which vendors don't tell (well mostly).
There is no single solution for APT
APT is a like a war. No single solution is good enough. You cannot have a solution to your APT problem.…Continue
Added by bikash on April 20, 2013 at 10:30am — No Comments
Static Application Security Testing (SAST)
SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.
• SAST can pin point the code where the flaw is.
• you can detect vulnerabilities before it is deployed:…Continue
Added by bikash on April 17, 2013 at 9:30pm — No Comments
IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.
On any given day; any organisation can suffer irreparable harm at the hands of cyber- attackers. No organisation is too small or too big for this.
Unfortunately this battle field is not symmetric. The attackers have the clear advantage. Defenders have to protect a wide perimeter…Continue
Added by Sharat AIRANI on April 12, 2013 at 8:00pm — No Comments
Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the future.
What do you think are the top technologies that will…
Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?
In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a product to simulate a human hacker. I believe Magic helped me in Security. Somehow deep in my heart I always believed there is a magician in every hacker.
(Read more: …Continue
Added by bikash on April 4, 2013 at 3:00am — No Comments