December 2014 Blog Posts (14)

A Sprint To Protect Point-of-Sale

(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)

A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities

From Target to…

Continue

Added by CISO Platform on December 23, 2014 at 6:30pm — No Comments

The Notorious 9 in Cloud Security

(Read More: Top 6 'Cloud Security' talks from RSA Conference 2016 (USA))

The Notorious 9 in Cloud…

Continue

Added by CISO Platform on December 23, 2014 at 6:00pm — No Comments

How the Heartbleed bug was found by Antti Karjalainen - discoverer of Heartbleed

(Read more:  APT Secrets that Vendors Don't Tell)

The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk at CISO Platform Annual Summit, will give background how the…

Continue

Added by CISO Platform on December 22, 2014 at 8:00pm — No Comments

Bitcoin Transaction Malleability: An Insight

Bitcoin Transaction Malleability, an Insight by Daniel Chechik.The bitcoin network vulnerability had disturbed the huge bitcoin network. Plenty trading websites like Silk Road,MTGox and more have been victim to "Bitcoin Transaction Malleability." This talk will take you through the vulnerability and how exactly it may be exploited.…



Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

Cyber Safety in Cars and Medical Devices

Cyber Safety in Cars and Medical Devices by Beau Woods, creator of IOT Security Framework. We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life and safety systems, bits and bytes meet flesh and bone. We must know, not just hope, that devices with the ability to impact human life and public safety are worthy of our trust. Learn how the safety impacts of merging cyber security with cars and…

Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

More Shadow Walker The Progression of TLB Splitting On X86 Jacob Torrey

This talk will cover the concept of mis-using the hardware (x86 translation lookaside buffer) to provide code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware. After requisite background is provided, the talk will then move to the new research, the author's method for splitting a TLB on Core i-series and newer processors and how it can again be used for defensive (MoRE…

Continue

Added by CISO Platform on December 19, 2014 at 2:00am — No Comments

Guideline for Secure Configuring SAP NetWeaver ABAP

With this article we are starting a new series of guidelines describing some basic assessment procedures one can carry out on various business applications that would help security professionals to expand their ERP systems’ immunity to attacks.

As we all know, ERP systems such as SAP may favour the quality of management of all the information and resources involved in a company's operations.

However, while ERP applications promote the way business processes are organized, they…

Continue

Added by Alexander Polyakov on December 8, 2014 at 2:00pm — No Comments

CISO Platform Annual Summit, 2014 Highlights

CISO Platform Annual Summit @ Mumbai, last week saw over 250+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.

(Read more:  …

Continue

Added by pritha on December 4, 2014 at 6:00pm — No Comments

6 Key Principals for creating a Secure Cloud

Securing a cloud environment requires, and offers a new approach to security: holistic Security Intelligence. Many organizations have dozens of different point products to address security concerns. For example, they may have a firewall from one vendor, identity management from another, and application scanning from a third. This creates a siloed approach to security. However, as attacks become both more complex and sophisticated, it has become a priority to look across all of these…

Continue

Added by CISO Platform on December 4, 2014 at 3:30pm — No Comments

Why current SAP Security Guides Always Provide So Little Help?

This article will be about different guidelines, which can help to secure your SAP system. But nothing to worry about - this post will nevertheless remain useful and interesting, even if it does not contain information about 0-days or have no words like “cyber” or “weapon” in title. So, let’s go.

This blog post will be about new guideline, or standard, for securing - or testing of the security - of SAP implementations, which is going to be a first standard of the EAS-SEC standard…

Continue

Added by Alexander Polyakov on December 3, 2014 at 7:30pm — No Comments

5 Key Benefits of Source Code Analysis

Static Code Analysis: Binary vs. Source

Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. According to Gartner’s 2011 Magic Quadrant for Static Application Security Testing (SAST), “SAST should be…

Continue

Added by CISO Platform on December 2, 2014 at 7:00pm — No Comments

Source Code Analysis- How to Remediate your Vulnerabilities

The AppSec How -To:Visualizing and Effectively Remediating Your Vulnerabilities: The biggest challenge when working with Source Code Analysis (SCA) tools is how to effectively prioritize and fix the numerous results. Developers are quickly overwhelmed trying to analyze security reports containing results that…

Continue

Added by CISO Platform on December 2, 2014 at 4:00pm — No Comments

10 Steps to Secure Agile Development

In Agile’s fast-paced environment and frequent releases,security reviews and testing sound like an impediment to success. How can you keep up with Agile demands of continuous integration and continuous deployment without abandoning security best practices? 

Companies have found the following ten practices helpful to achieve a holistic secure…

Continue

Added by CISO Platform on December 1, 2014 at 4:30pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

1999

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts