September 2015 Blog Posts (8)

Webinar on "Defusing Cyber Threats Using Malware Intelligence"

Webinar on "Defusing Cyber Threats Using Malware Intelligence" Video by Arun Lakhotia.

  • How a Malware can be source of intelligence about the attacker
  • How Large scale, automated malware analysis to extract intelligence is feasible
  • How Malware intelligence can aid defuse targeted attacks

( Read more:  …

Continue

Added by Gireesh Kumar on September 29, 2015 at 2:30pm — No Comments

Workshop: CASB - Part 1

CASB Workshop Part 1 by Bikash Barai:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers…

Continue

Added by Gireesh Kumar on September 28, 2015 at 5:30pm — No Comments

Webinar on "Front Door Access to Pwning Millions of Android Devices"

Webinar on  "Front Door Access to Pwning Millions of Android Devices" Video by Avi Bashan.

  • Learn about Android certificate & permission framework including the roles of Google, OEMs, & mobile carriers. 
  • Overview of the Mobile Remote Support Tools Architecture (mRST) implementation and flaws & how it correlates to the Android architecture. 
  • Explain how these certifi-gate vulnerabilities can be exploited, the implications on enterprise…
Continue

Added by Gireesh Kumar on September 22, 2015 at 3:30pm — No Comments

Wargame : Dashboard & Metrics For The Management

Wargame : Dashboard & Metrics For The Management Video by Renu Rajani,Sridhar Govardhan,Raghu Kumar Paruchuri,Tamaghna Basu.

Added by Gireesh Kumar on September 11, 2015 at 7:00pm — No Comments

Workshop: Application Security - Part 2

Application Security Workshop Part 2 by Nilanjan De:

  • Web Attack Chaining
  • Understanding IAST/RASP
  • Realtime Polymorphism…

Continue

Added by Gireesh Kumar on September 11, 2015 at 6:30pm — No Comments

Workshop: Application Security-Part 1

Application Security Workshop Part 1 by Jitendra Chauhan:

  • Web Attack Chaining
  • Understanding IAST/RASP
  • Realtime Polymorphism

Application Security Workshop Part 1 Video by Jitendra Chauhan:…

Continue

Added by Gireesh Kumar on September 9, 2015 at 7:30pm — No Comments

Workshop: Network Forensic Tools & Techniques

Network Forensic Tools & Techniques Workshop by Tamaghna Basu:  

  • Introduction,Basic Protocol Analysis,
  • Forensic Analysis Network/Web/Malware,
  • Basic Packet Analysis Challenges…

Continue

Added by Gireesh Kumar on September 9, 2015 at 7:00pm — No Comments

Analysis Report: Cyber Attack & Incident Data, 2015

IBM Managed Security Services continuously monitors billions of events per year, as reported by more than 8,000 client devices in over 100 countries. This report is based on data IBM collected between 1 January 2014 and 31 December 2014 in the course of monitoring client security devices as well as data derived from responding to and performing analysis on cyber attack incidents. Because our client profiles can differ significantly across industries and company…

Continue

Added by CISO Platform on September 9, 2015 at 4:30pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service