Social Network For Security Executives: Help Make Right Cyber Security Decisions
Business applications are vital for the successful functioning of any organization. Therefore, managing their information security risks are just as important as the business itself. If I ask about different measures you take to ensure security of your applications, you might reply with few initiatives such as periodic secure code reviews, external scans, vulnerability assessments & penetration testings and perhaps audits etc. But what If I asked how…Continue
Added by Pushkal Mishra on August 30, 2019 at 7:00pm — No Comments
Added by Dr. Anton Chuvakin on August 27, 2019 at 4:00am — No Comments
Hi CISO This is the Chapter 2 Information Security Incident Response. It is a part of Security Operations Analysis - Crowdsourcing eBook on Peerlryst - Click Here
Identifying and responding…Continue
Added by Mohamed marrouchi on August 23, 2019 at 6:30pm — No Comments
Don’t boil the ocean. Start with that.
Before I dipped my toes into security I did a stint as an application administrator. I was responsible for managing system and application monitoring. More performance and capacity monitoring than anything but there is a clear overlap in tools that capture logs and generate alerts based on thresholds, e.g. an IBM Tivoli monitoring, HP EMS, or Microsoft SCOM and a SIEM.
My employer had just one of those tools at the time I started…Continue
Added by Drew Brown on August 22, 2019 at 7:30am — No Comments
According to an alert published by FBI on January 2019, Business Email Compromise (BEC) and Email Account Compromise (EAC) have10 Billion losses since October 2013. Traditionally, social engineering and Phishing techniques have been the most common ways to gain access to business…Continue
Added by vasanth Kumar on August 21, 2019 at 12:46pm — No Comments
It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.
With any security program, the goal is to identify the vulnerabilities, the related risks, mitigations or compensating controls that can be implemented. With the volume of development including libraries and binaries from third-party/open source repositories like: Git-Hub,…
Added by Drew Brown on August 15, 2019 at 7:30pm — No Comments
Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers ... The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened.
The legal case built was quite interesting. Before I share the legal case link heres a short summary just in-case you dont know…Continue
Added by CISO Platform on August 6, 2019 at 12:30pm — No Comments
This is a summary of the panel discussion at Security Symposium & Cyber Sentinel Award by Infocon global. The panel discussion was moderated by Jitendra Chauhan (Head of Engineering at FireCompass) along with Balaram (CISO, Manthan), Ananth Kumar Ms (Head-IT Assurance & Security, Janalaxmi Financial Services), Sumanth Naropanth and Ramakrishna Roy.…Continue
Added by CISO Platform on August 4, 2019 at 9:00am — No Comments
Phishing attack allows attackers to steal user’s credentials
By now I am sure we have all seen the commercials of people walking up to their ATMs and taking cash out without physically touching the ATM machine. It is a feature known as “Cardless ATM banking” and has been adopted and used by several banking and financial institutions who boast about the faster transaction times (about 15 seconds from start to finish). Cardless ATM allows banking…Continue
Added by Davin A Jackson on August 2, 2019 at 7:30pm — No Comments
Topic - MDM Installation for mobile phones in organization
Added by Sridharan on August 1, 2019 at 10:00am — No Comments