All Blog Posts (1,243)

SAP Security for CISO’s. Part two: Beginner’s introduction to SAP

This time we will speak about SAP in particular. So, what is SAP? First of all, SAP is a German company that develops and sells business software. SAP is famous for its ERP system - the most widespread business application. However, SAP provides much more than just an ERP. In 2005, it introduced its SAP Business Suite – a number of integrated business applications such as ERP, CRM, PLM, SCM, and SRM. These business applications consist of different components. For example, ERP includes…

Continue

Added by Alexander Polyakov on February 15, 2016 at 1:30am — No Comments

5 Questions You Want Answered Before Implementing Enterprise Mobility Management (EMM) Solution

Technology comes with a cost. The cost, one could never have imagined if not properly implemented. Enterprise Mobility Management (EMM) solution at place boosts the productivity, enhances mobile security, and provides easy access to corporate content. However, the important question is whether you are ready for this technology or not?

Here in this…

Continue

Added by pritha on February 12, 2016 at 5:30pm — No Comments

9 Top Features To Look For In Next Generation Firewall (NGFW)



Firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. The rapid growth of new innovative technology and alongside with the massive growth of new security threat, the traditional firewall is not enough to compete. To deal with these changes, vendors in the enterprise firewall market have created a new generation of firewall devices dubbed the Next Generation Firewall or NGFW.

A…

Continue

Added by pritha on February 12, 2016 at 5:00pm — No Comments

11 Ways To Measure The Effectiveness Of Your Identity & Access Management (IAM) Solution

Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue increasing and other tangible benefits that are cost reducing.

Here…

Continue

Added by pritha on February 12, 2016 at 5:00pm — No Comments

Top 6 Reasons Why Data Loss Prevention(DLP) Implementation Fails

Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:

  • Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and formulating DLP policy make implementation…
Continue

Added by pritha on February 10, 2016 at 11:30pm — No Comments

IDC Report: CISOs' Guide to Enabling a Cloud Security Strategy

For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully…

Continue

Added by CISO Platform on January 27, 2016 at 2:00pm — No Comments

Session on Practical Demo of Collecting Threat Intel Using OSINT Tools.

Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.

( Read More: How To Benchmark A Web Application Security Scanner? )…

Continue

Added by Gireesh Kumar on January 19, 2016 at 3:30pm — No Comments

Identity and Access Management Workshop.

Identity and Access Management Workshop by Manjula Sridhar:

  • Introduction & Scope
  • Taxonomy
  • Global Trends for Roadmap
  • Capability Maturity Models
  • Vendor Selection Criteria
  • Guide to Vendors in the Landscape
  • CPI Findings

( Read More: 11 Ways To Measure The Effectiveness Of Your Identity & Access…

Continue

Added by Gireesh Kumar on January 13, 2016 at 6:00pm — No Comments

Wargame Strategy Simulation:Creating A Successful Evaluation & Implementation Checklist For An IT GRC Solution

Wargame Strategy Simulation : Creating A Successful Evaluation & Implementation Checklist For IT GRC Solution Video by Ajay Agarwal,Nadir Bhalwani,Aditya Sarangapani,Sudarshan Singh.

( Read More: Using 80/20 Rule In Application Security Management )…

Continue

Added by Gireesh Kumar on January 12, 2016 at 5:00pm — No Comments

CISO Platform Top IT Security Influencers (Part 1)



CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information security industry's in various ways. This list includes top researchers, industry experts, leading entrepreneurs, a must follow for infosec industry. The list will be declared in 4 parts each with 25 Top Influencers, this is the first…

Continue

Added by pritha on January 8, 2016 at 2:30am — No Comments

Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours.

Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours Video by Paul Raines, Pravesh Sharma, Shirish Dandekar, Sunil Mehta.

Added by Gireesh Kumar on December 28, 2015 at 3:30pm — No Comments

Wargame Strategy Simulation : Creating Plan For Technology Evaluation For SOC/SIEM Implementation.

Wargame Strategy Simulation : Creating An Action Plan For Technology Evaluation For SOC/SIEM Implementation Vidoe by Sagar Karan, Avinanda Ghosh, Chitranjan Kesari, Robert H Klein, Sudeep Kumar Das, GB Shaik.

Added by Gireesh Kumar on December 28, 2015 at 3:30pm — No Comments

Top 8 CyberSecurity Predictions for 2016

Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception has begun to have a dramatic impact on the…

Continue

Added by CISO Platform on December 4, 2015 at 11:30am — No Comments

Security Metrics and Dashboard for CEO

Information Security Metrics For The Board

It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the CEO to understand the information security posture of the company. Many…

Continue

Added by bikash on December 2, 2015 at 9:00pm — 2 Comments

SAP Afaria Stored XSS vulnerability - detailed review

Today we will show how SAP Afaria, an MDM solution from a world-famous software vendor, works and how cybercriminals can attack it in different ways.

In a nutshell, MDM is a set of services that help an administrator of a large company to control the mobile devices (smartphones, tablets, phablets and so on and so forth) of employees, thus establishing the security measures of corporate data stored and processed on those devices. A special application called MDM client is installed on…

Continue

Added by Alexander Polyakov on November 25, 2015 at 8:32pm — No Comments

Workshop: CASB - Part 2

CASB Workshop Part 2 by Gaurav Bhatia:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers 

CASB Workshop Part 2 Video by Gaurav Bhatia:…

Continue

Added by Gireesh Kumar on November 2, 2015 at 6:30pm — No Comments

The Forrester Wave: DDoS Guide, Q3 2015

Why Read This Report

In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them to determine which are best able to protect their customers’ business. The DDoS services space is growing in importance because distributed denial of service attacks now…

Continue

Added by CISO Platform on October 30, 2015 at 3:30pm — No Comments

Battling Fraud: How cybercriminals bypass your security defenses?

Effectively combating cybercriminals requires understanding how they operate. How do they render endpoint protection solutions inoperable? What methods do they use to sidestep two- factor authentication? How do they trick device ID systems and behavioral analytic and risk engines into believing their transactions are legitimate?

This white paper…

Continue

Added by CISO Platform on October 30, 2015 at 3:00pm — No Comments

Buyers Guide for Identity & Access Governance

This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the data center to the cloud.

Why Read the Buyer's Guide? 

To help you evaluate whether an IAM solution effectively supports your short- and long- term objectives, this guide…

Continue

Added by CISO Platform on October 9, 2015 at 11:00pm — No Comments

Sneak Peek Into Conference Agenda @ CISO Platform Annual Summit, 2015

Keynote Turbo Talks

Protecting SCADA environments

Daniel Lakier, CTO & President at…

Continue

Added by pritha on October 7, 2015 at 5:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service