April 2013 Blog Posts (6)

CISO Round Table on Effective Implementation of DLP & Data Security

Our special webinar by CISO Platform and WebSense, was a great success with over 120 CISO's registering for the webinar.


Key Areas Covered

  1. Which are the most commonly used data security controls?
  2. What are the best practices for an effective Data Security Strategy?
  3. Which are the Key challenges while implementing Data Security Strategy?
  4. How should one choose a Data Security Vendor?
  5. Understanding of technology…

Added by CISO Platform on April 23, 2013 at 1:30am — No Comments

APT Secrets that Vendors Don't Tell

APT (Advanced Persistent Threats) is the talk of the town. There is too much of noise and confusion. Everybody wants to make money. Quite a few uses FUD (Fear Uncertainty and Doubt) to sell their products. I wanted to highlight the APT secrets which vendors don't tell (well mostly).


There is no single solution for APT

APT is a like a war. No single solution is good enough. You cannot have a solution to your APT problem.…


Added by bikash on April 20, 2013 at 10:30am — No Comments

Checklist: How to choose between different types of Application Security Testing Technologies?


Static Application Security Testing (SAST)

SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.



• SAST can pin point the code where the flaw is.

• you can detect vulnerabilities before it is deployed:…


Added by bikash on April 17, 2013 at 9:30pm — No Comments

Future Proofing – Protecting the “IT” arena

IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.

On any given day; any organisation can suffer irreparable harm at the hands of cyber- attackers. No organisation is too small or too big for this.

Unfortunately this battle field is not symmetric. The attackers have the clear advantage. Defenders have to protect a wide perimeter…


Added by Sharat AIRANI on April 12, 2013 at 8:00pm — No Comments

Interview Series: A CTO perspective on BIG Data, BYOD and Top Security Trends

Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the future.

What do you think are the top technologies that will…


Added by CISO Platform on April 8, 2013 at 3:00pm — 1 Comment

Magic, Hacking and Kevin Mitnick

Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?

In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a product to simulate a human hacker. I believe Magic helped me in Security. Somehow deep in my heart I always believed there is a magician in every hacker.

(Read more:  …


Added by bikash on April 4, 2013 at 3:00am — No Comments

Monthly Archives













CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */