November 2019 Blog Posts (124)

Top 5 Emerging Vendors providing DNS Security

  • Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.

 

What is DNS (Domain Name System)?

  • DNS (Domain Name System) is the most important part of Internet. When entering any website’s address (e.g.…
Continue

Added by CISO Platform on November 29, 2019 at 1:20pm — No Comments

Top 5 Emerging Vendors providing DNS Security

  • Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.

 

What is DNS (Domain Name System)?

  • DNS (Domain Name System) is the most important part of Internet. When entering any website’s address (e.g.…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Key Metrics for the Application Security Testing (AST)

Application Security Testing ( AST ) are tools and services that helps you discover security vulnerabilities in all kinds of applications. Current application security practices/tools available broadly falls into following categories:
  • Static Application Security Testing (SAST): Static application security testing tools analyzes the application source code to determine if vulnerabilities exist. IT is also referred to as White-box testing.…
Continue

Added by Denise on November 29, 2019 at 1:00pm — No Comments

Key Program Metrics of Data Loss Prevention

Data Loss Prevention is a set of security controls that helps organization protect their sensitive data, throughout its life cycle, across all platforms, from getting disclosed to unauthorized users (insiders or outsiders) either accidentally or intentionally.

Different types of DLP:
  1. Endpoint DLP: Protects data leak from endpoints devices such as, data leak from removable storage devices (USB’s), Local…
Continue

Added by Denise on November 29, 2019 at 1:00pm — No Comments

Top 5 Network Advanced Threat Protection (ATP) Solutions for Q1 2017

Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Key Program Metrics of Unified Threat Management (UTM)

Unified Threat Management (UTM) is an all in one security solution that integrates firewalls, anti-viruses, content filtering, spam filtering, VPN protection, anti-spyware and other security system you need to protect your network. It can perform many security functions simultaneously to provide layered protection to all sizes of organization.

Key…

Continue

Added by Denise on November 29, 2019 at 1:00pm — No Comments

Top 5 Emerging Vulnerability Management Solutions for Q1 2017

  • Vulnerability Management Solutions helps to prioritize and remediate vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.). It correlate and help to prioritize the risk (some do this by…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Threat Hunting tools for Q1 2017

Here is the list of top 5 vendors emerging Threat Hunting tools, but before that let us understand what threat hunting exactly refers to.

Threat Hunting?

  • Threat hunting is a proactive approach to identifying adversaries rather than reactively waiting for an alert to go off. This is an iterative process, meaning that it has to be continuously carried out in a loop, beginning with a hypothesis. It involves a security analyst who keeps an…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Network Forensic tools for Q1 2017

  • Network Forensics is related to the monitoring and analysis of network traffic for the purposes of information gathering, legal evidence collection also to detect and identify any intrusion. Network investigation deals with volatile and dynamic data. Often network traffic is transmitted and can be lost thus network forensic must be a proactive process rather than just being reactive. This article…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Learn More About Key Program Metrics Of CASB

Cloud Access Security Brokers (CASB) are placed between cloud service consumers and cloud service providers to support continuous visibility, compliance, threat protection, and security for cloud services. They act as a security policy enforcement point for Cloud-based Services (primarily SaaS).

Common Use Cases:

-> Govern Shadow IT – Discovery, Risk…

Continue

Added by Denise on November 29, 2019 at 1:00pm — No Comments

Top 5 emerging vendors of MDR Solutions (Managed Detection and Response)

  • Here is the list of top 5 emerging vendors of MDR Solutions (Managed Detection and Response). But before that let us understand what is the difference between MDR and MSS (Managed Security Services).

 

MDR vs MSS

  • MDR is different from MSS. Managed Security Service Providers (MSSPs) monitor network security controls…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

  • We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending RSAC 2018, April 16 to 20 in San Francisco.
  • BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo like a pro.  

Emerging IT Security…

Continue

Added by CISO Platform on November 29, 2019 at 12:30pm — No Comments

Key Metrics Of Enterprise Mobility Management (EMM)

Enterprise mobility management ( EMM ) is a suite of products which allows you to safely enable the use of mobile devices in your organization. Employees today want to use their personal devices for checking corporate mails and access sensitive documents as and when they need it, be it inside or outside the corporate network. This trend is not only adding to the productivity but also helps organizations cut down spending on IT infrastructure requirements.

EMM…

Continue

Added by Denise on November 29, 2019 at 12:30pm — No Comments

FireCompass Announces The Winners Of “Top Cybersecurity Startups 2017 (India)”

FireCompass Top Security startup

  • FireCompass, an AI based platform which helps you to discover & compare Cybersecurity products has just announced the names of Top CyberSecurity Startups 2017 (India). 
  • With the growing cyber attacks, the role of innovations in the cyber-security startups ecosystem has become more crucial than ever. “FireCompass Top Startup” recognition is part of the vision to help promote innovations in the…
Continue

Added by CISO Platform on November 29, 2019 at 12:30pm — No Comments

Report – Cyber Security Maturity Of Indian Industry

Security Maturity Score By Industry :

 

 

 

Identification Capabilities By Industry :

 

 

Prevention Capabilities By Industry…

Continue

Added by CISO Platform on November 29, 2019 at 12:30pm — No Comments

Key Program Metrics of Vulnerability Assessment

Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.

Vulnerability management program addresses the inherent problem associated with vulnerable software programs. These vulnerability if not checked…

Continue

Added by Denise on November 29, 2019 at 12:30pm — No Comments

Information Security Metrics and Dashboard for the CEO / Board

It is very important to properly define the right Information Security Metrics for an organization to estimate the security…

Continue

Added by CISO Platform on November 29, 2019 at 12:30pm — No Comments

Top 5 Vendors in Identity & Access Management (IAM) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.

Identity and Access Management is the practice of managing digital identities through-out their life-cycle, managing access rights to enterprise resources and auditing of user access rights, use/misuse of digital identities. The entire process is…

Continue

Added by pritha on November 29, 2019 at 12:30pm — No Comments

Key Program Metrics of Endpoint Detection and Response (EDR)

An emerging technology, Endpoint Detection and Response (EDR) constitutes a set of tools and solutions that enterprises use to detect, investigate and mitigate suspicious activities on hosts and endpoints. The term was originally called as Endpoint Threat Detection and Response (ETDR) but it is more popular as EDR.

Key Program Metrics:

Level of…

Continue

Added by Denise on November 29, 2019 at 12:30pm — No Comments

FireCompass wins NASSCOM Emerge 50, 2017 Award

We are happy to share that FireCompass has been selected as a winner of NASSCOM’s 2017 Emerge 50 award. At FireCompass our vision is to transform the way enterprises make security strategy and buying decisions.

 

NASSCOM Emerge 50 2017 Awards as described in their website is a marathon search for…

Continue

Added by CISO Platform on November 29, 2019 at 12:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service