September 2016 Blog Posts (4)

Open source network security:Top 10 Open Source Software Security Tools

Short of resources, but still want to have a strong IT-security ecosystem? There are multiple tools in the market specially for small to medium enterprises who can use these open source tools. Although, they can't match the capabilities as provided by the premium tools provided by big vendors which comes with hefty price tags. But still they provide quite a decent features without burning your pocket. We bring you the list of Top 10 Open Source or Free IT-Security…


Added by Vaibhav Singhal (CISO Platform) on September 27, 2016 at 11:00am — No Comments

Planning to be a CISO

Everyone wants to know this today. One of the key attributes I have found in all the security people in last 14 years of my career is you need to be naturally skeptical when you look at stuff. This is one key aspect and if you don’t have this you would not a be good security person. You would have to ground that with good business pragmatism, it not about technology, it is about securing.

( Read…


Added by Syed Azher on September 15, 2016 at 10:00am — No Comments

Top 10 Talks From Black Hat Conference USA, 2016

Our editorial team has handpicked the best of the best talks at Black Hat Conference USA, 2016 - one of the largest IT Security Conferences in the world.

Black Hat conference is a security conference which brings together variety of security professionals and hackers to discuss on the current information security challenges and security landscape. The event is composed of two major sections, the Black Hat briefings and Black Hat trainings. Black Hat 2016 USA was held on July 30 -…


Added by Atul kumar Singh (CISO Platform) on September 13, 2016 at 10:00pm — No Comments

Aligning security objectives with business objectives

This is about developing information security master plan, the concept is the fact that when you develop a plan you begin by starting risk assessment, not a risk assessment from security stand point but from a business standpoint. You go through that process by interviewing various executive getting their input and understand what they believe are the risks that the business is exposed to. Then you take that way and evaluated risk…


Added by Syed Azher on September 1, 2016 at 12:00pm — No Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service