Social Network For Security Executives: Help Make Right Cyber Security Decisions
Short of resources, but still want to have a strong IT-security ecosystem? There are multiple tools in the market specially for small to medium enterprises who can use these open source tools. Although, they can't match the capabilities as provided by the premium tools provided by big vendors which comes with hefty price tags. But still they provide quite a decent features without burning your pocket. We bring you the list of Top 10 Open Source or Free IT-Security…Continue
Added by Vaibhav Singhal (CISO Platform) on September 27, 2016 at 11:00am — No Comments
Everyone wants to know this today. One of the key attributes I have found in all the security people in last 14 years of my career is you need to be naturally skeptical when you look at stuff. This is one key aspect and if you don’t have this you would not a be good security person. You would have to ground that with good business pragmatism, it not about technology, it is about securing.
Added by Syed Azher on September 15, 2016 at 10:00am — No Comments
Our editorial team has handpicked the best of the best talks at Black Hat Conference USA, 2016 - one of the largest IT Security Conferences in the world.
Black Hat conference is a security conference which brings together variety of security professionals and hackers to discuss on the current information security challenges and security landscape. The event is composed of two major sections, the Black Hat briefings and Black Hat trainings. Black Hat 2016 USA was held on July 30 -…Continue
Added by Atul kumar Singh (CISO Platform) on September 13, 2016 at 10:00pm — No Comments
This is about developing information security master plan, the concept is the fact that when you develop a plan you begin by starting risk assessment, not a risk assessment from security stand point but from a business standpoint. You go through that process by interviewing various executive getting their input and understand what they believe are the risks that the business is exposed to. Then you take that way and evaluated risk…Continue
Added by Syed Azher on September 1, 2016 at 12:00pm — No Comments