August 2017 Blog Posts (10)

Technologies For Security Of BYOD

This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.

The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect the data and offer ability to stay connected. A reliable BYOD policy is required to help and safeguard our network. BYOD is to develop a policy that…


Added by pritha on August 30, 2017 at 2:00pm — No Comments

The Cyber Security Concerns - An interesting read

Snapshot of some numbers from the article link above.…

Added by Sunil Pandey on August 29, 2017 at 7:00am — No Comments

How to design an effective phishing simulation ?

This article was contributed by Sridhar Govardhan, CISA, CISM, CEH, General Manager-Cyber Security at Wipro

Phishing is a type of social engineering attack. Using phishing email, the attacker cleverly manipulates the natural human tendency to trust others and tricks the victim into act as per the instructed in the email. To be convincing, the…


Added by pritha on August 28, 2017 at 2:00pm — No Comments

Free and Open Source Software Evaulation parameters

Below are a few free & open source software evaluation parameters:

Parameters Description
Community The driving force and main…

Added by Sridharan on August 21, 2017 at 6:39pm — No Comments

Complete Guide To Log & Event Management (by Anton Chuvakin Gartner)

Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies but also on architecting their joint deployments. In addition, he will provide recommendations for companies…


Added by CISO Platform on August 18, 2017 at 12:30pm — No Comments

eBook : Deception 2.0 for Dummies

Deception is a very useful and effective tactic to detect and evade threats in many situations. The modern cybersecurity situation is one such example.

This book explains cybersecurity deception and technologies in six short chapters which includes:…


Added by CISO Platform on August 18, 2017 at 12:00pm — No Comments

Top 9 Past Security Talks By Dr. Phil Polstra

Dr. Philip Polstra

Author of ‘Linux Forensic’, 'Windows Forensic', 'Hacking & Penetration Testing With Low Power Devices' | Frequent speaker at DEFCON, Blackhat, BSides, GrrCON, ShakaCON | Renowned forensic expert

About : Digital forensics professor by day. Hardware hacker and penetration tester by night. Associate Professor, Digital Forensics at Bloomsburg University of Pennsylvania. Attended Northcentral University

Dr. Phil Polstra shall be conducting a Handson…


Added by pritha on August 11, 2017 at 7:30pm — No Comments

Reference Security Architecture for Mobility- Insurance Task Force

The project title for this task force is “Reference security architecture for Mobility”. Some of the key things that you are going to learn from this presentation is:

  • The reader will learn about the current aspects of mobility, its use…

Added by Balaji Gowda on August 2, 2017 at 12:30pm — No Comments

Infrastructure and Cyber Security Trends and Challenges

It is important to understand the new trends that are occurring amongst cyber security experts to make sure you properly protect your organization. The following are some key trends that you need to be aware of.

1) Data Co-relation Before adding more devices to a network, perform data correlation across the existing devices first. Networks are…


Added by Sayyad Salim on August 2, 2017 at 10:30am — No Comments

information security maturity|Cyber Security Maturity Model- IT/ITES Task Force

The project title for this task force is “Cyber Security Maturity Model for Organizations”. Some of the key things that you are going to learn from this presentation is:

  • The user organizations will learn, how to easily adapt a cyber security maturity assessment model based on the widely accepted frameworks such as NIST…

Added by Balaji Gowda on August 1, 2017 at 5:30pm — No Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service