All Blog Posts (1,243)

Gaana.com hacked. 10 Million users affected. What should you do?

Gaana.com, one of the  popular music streaming service got hacked. It is reported that 10 million username, email addresses, MD5-encrypted password, date of births, and other personal information has been stolen. 

It is reported by their CEO that they have taken the adequate measures to safeguard post incident. Here are a…

Continue

Added by CISO Platform on May 29, 2015 at 2:30pm — No Comments

Session, Workshops, Round Tables & Wargames @ CISO Platform Decision Summit 2015 (June 4-5, New Delhi)

Top Security Worskshops

IT GRC Workshop Session

  • Key Components and Architecture for GRC
  • How to Jumpstart your GRC program with freely available tools and content
  • Overview of Free Tools that you can use today
  • Complete Vendor and…
Continue

Added by pritha on May 28, 2015 at 5:00pm — No Comments

The 10 Commandments of BYOD

The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services enmasse. Bring Your Own Device (BYOD) was born and employees followed with fervor.

Forrester’s study of US information workers revealed that 37%…

Continue

Added by CISO Platform on May 12, 2015 at 3:00pm — No Comments

Beyond tools-Exploiting the application Logic

Watch Video: (Webinar) "Beyond tools-Exploiting the application Logic"

( Read more:  Checklist to Evaluate a DLP Provider )

What will you Learn…

Continue

Added by Sagar k on May 8, 2015 at 8:00pm — No Comments

How to Combat Malware-Driven Financial Fraud

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services,…

Continue

Added by CISO Platform on May 5, 2015 at 5:30pm — No Comments

Top Talks from RSA Conference 2015 - San Francisco

We had a long and nice week at RSA Conference 2015 in San Franciso. Some of you might have missed the event or missed some of the good talks even though you were there. so we have handpicked the best of RSA  just for you.

Important Note:

  • All presentations are courtesy RSA and is presented as-is without any modification
  • Some of the descriptions below are taken from RSA website (…
Continue

Added by pritha on April 29, 2015 at 11:30am — No Comments

Tools Of The Hardware Hacking Trade

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:30am — No Comments

How To Avoid The Top Ten Software Security Flaws

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Rapid Threat Modeling Techniques

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Westjets Security Architecture Made Simple We Finally Got It Right

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 2:00am — No Comments

Achieving Defendable Architectures Via Threat Driven Methodologies

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:30am — No Comments

Making Threat Intelligence Actionable with STIX

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:30am — No Comments

Implementing An Automated Incident Response Architecture

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:30am — No Comments

Threat Intelligence Is Like Three Day Potty Training

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Cyber Security Operation Center for Critical Infrastructure Protection

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Don't Get Left In The Dust How To Evolve From CISO To CIRO

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Security Metrics That Your Board Actually Cares About

(Source-RSA 2015,USA)

Added by pritha on April 29, 2015 at 1:00am — No Comments

Hottest Buzzword Trend Analysis from RSA Conference 2015- San Francisco

RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.

How we did the analysis?

We took hundreds of pics of booths all around the expo floor and tried to do the keyword analysis and find out the most prominent buzz words. We tried to give importance to relative size of the…

Continue

Added by CISO Platform on April 28, 2015 at 1:00am — No Comments

Key Learning from Amit Yoran's keynote @ RSA Conference 2015

I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.

Taller walls won't solve the problem. We need fundamentally different approach which is not discovered yet.

We need fundamental shifts in computer science research to be more effective in building better…

Continue

Added by CISO Platform on April 28, 2015 at 12:00am — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service