June 2013 Blog Posts (8)

Why AppSec (Application Security) won't always bail you out of application based risks?


It is very typical of organizations to perform Web Application (WebApp) Security Assessments before the go-live of newer applications or periodic assessments of their existing applications. And these assessments are known by all sorts of aliases like Application Penetration Testing (App PenTest), Ethical Application Hacking etc. For those companies lacking the internal core…


Added by Dhananjay Rokde on June 27, 2013 at 11:00am — No Comments

How much Secure is Safe?

Regardless of how safe and secure any organisation may think its IT infrastructure is, they realize that they are still not immune to information security threats. In addition to deploying the right tools and technology, organisations globally needs to develop a robust and competent workforce equipped with the necessary skills to adequately defend its IT infrastructures. These cyber defenders need not just basic trained to sufficiently defend against mounting security threats, more than…


Added by Sharat AIRANI on June 26, 2013 at 8:00pm — No Comments

Fast Changing Dynamics in Enterprise Mobility

As the organizations are growing in size,workforce is also becoming increasingly mobile. Employees are using mobile devices like smart phones, tablets and laptops to connect andaccess work related data. Enterprises are highly shifting to tablets from desktop pc and even encouraging their employees to bring their tablets or smart phones to work.

There are some key trends which have come to fore with the advent of enterprise mobility.The highly mobile workforce is not restricted to one…


Added by Kamal Sharma on June 20, 2013 at 11:30am — No Comments

Why are cybercrimes NOT always white-collar crimes?

A generic definition of a crime would be an act that is in violation of the applicable laws. A crime / criminal offense may essentially hurt an individual or the community (city or a nation) at large. This concept has now been taken to the next level with rising popularity of cybercrimes. In recent years, there are several analyst reports on the increasing trends of cybercrimes. Of late; several interchangeable terms for cyber crimes such as, computer crime, cyber fraud, internet crime,…


Added by Dhananjay Rokde on June 18, 2013 at 10:00am — No Comments

Proactive Security Management - “The next BIG focus“

IT Trends and challenges:

World is becoming Instrumental, Interconnected and Intelligent. IT security teams in enterprises are faced with rapidly mutating threats at every possible point of entry. This is fuelled by the fast evolution of threat landscape and sea of changes in network and security architecture.

  • Changing network paradigm
  • Network has taken center stage – Wired or wire-free
  • Excitement starts from data center
  • BIG data – A true…

Added by Sharat AIRANI on June 16, 2013 at 5:00pm — No Comments

Disaster Recovery and Business Continuity Management

Today enterprises live in a world where natural or man made disasters can crumble a business to its knees. It is therefore critically important for these enterprises to recognise the fact that disasters are real and happen and it is essential they have a structured programme to protect the information from external and internal threats and disasters.

Common Disasters:



Added by Ram Mohan C on June 6, 2013 at 12:00pm — 1 Comment

How to write a great article in less than 30 mins + Post Ideas

We all face difficulties in expressing our thoughts. Here are a few pointers which will help a person to write great articles in just 30 mins.

Step 1: Define the headline

When you write the articles ask yourself 3 questions:

  1. Are you saying something new?
  2. Are you saying something old but in a new way?
  3. Are you saying something which will help others to save time, money or effort?

If any…


Added by CISO Platform on June 5, 2013 at 5:30pm — No Comments

5 easy ways to build your personal brand !

How important is your personal brand in professional success?

Nobody can deny that personal reputation is critical in the path of professional success. Definitely the most important factor is "who you are?" but it is equally important "how others perceive you?".

In today's world due to online tools it is lot easier to build your personal brand. Here are the top steps:


Step 1:…


Added by CISO Platform on June 4, 2013 at 12:00pm — No Comments

Monthly Archives













CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */