April 2013 Blog Posts (6)

CISO Round Table on Effective Implementation of DLP & Data Security

Our special webinar by CISO Platform and WebSense, was a great success with over 120 CISO's registering for the webinar.

 

Key Areas Covered

  1. Which are the most commonly used data security controls?
  2. What are the best practices for an effective Data Security Strategy?
  3. Which are the Key challenges while implementing Data Security Strategy?
  4. How should one choose a Data Security Vendor?
  5. Understanding of technology…
Continue

Added by CISO Platform on April 23, 2013 at 1:30am — No Comments

APT Secrets that Vendors Don't Tell

APT (Advanced Persistent Threats) is the talk of the town. There is too much of noise and confusion. Everybody wants to make money. Quite a few uses FUD (Fear Uncertainty and Doubt) to sell their products. I wanted to highlight the APT secrets which vendors don't tell (well mostly).

 

There is no single solution for APT

APT is a like a war. No single solution is good enough. You cannot have a solution to your APT problem.…

Continue

Added by bikash on April 20, 2013 at 10:30am — No Comments

Checklist: How to choose between different types of Application Security Testing Technologies?

 

Static Application Security Testing (SAST)

SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.

 

Pros

• SAST can pin point the code where the flaw is.

• you can detect vulnerabilities before it is deployed:…

Continue

Added by bikash on April 17, 2013 at 9:30pm — No Comments

Future Proofing – Protecting the “IT” arena

IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.

On any given day; any organisation can suffer irreparable harm at the hands of cyber- attackers. No organisation is too small or too big for this.

Unfortunately this battle field is not symmetric. The attackers have the clear advantage. Defenders have to protect a wide perimeter…

Continue

Added by Sharat AIRANI on April 12, 2013 at 8:00pm — No Comments

Interview Series: A CTO perspective on BIG Data, BYOD and Top Security Trends

Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the future.

What do you think are the top technologies that will…

Continue

Added by CISO Platform on April 8, 2013 at 3:00pm — 1 Comment

Magic, Hacking and Kevin Mitnick

Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?

In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a product to simulate a human hacker. I believe Magic helped me in Security. Somehow deep in my heart I always believed there is a magician in every hacker.

(Read more:  …

Continue

Added by bikash on April 4, 2013 at 3:00am — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service