December 2019 Blog Posts (33)

Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk

Cybersecurity will be hard pressed to take on the new challenges of bank managed digital currencies.

Banks are developing their own digital currencies.  The introduction of Central Bank Digital Currencies (CBDC) is the beginning of an interesting trend that will change the cybersecurity dynamic for banking as it opens up an entirely new threat…

Continue

Added by Matthew Rosenquist on December 31, 2019 at 1:00pm — No Comments

NATIONAL CYBER SECURITY STRATEGY 2020 (NCSS 2020)

Call for Comments

1. Need for NCSS 2020 India was one of the first few countries to propound a futuristic …
Continue

Added by CISO Platform on December 30, 2019 at 12:00pm — No Comments

The 7 Most Dangerous Digital Technology Trends

As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service capabilities to enrich the lives of people globally.  But there is a catch.  For every opportunity, there is a risk.  The more dependent and entrenched we become with technology…

Continue

Added by Matthew Rosenquist on December 27, 2019 at 4:58am — No Comments

Becoming a Cloud Security Architect - my personal experience

A couple of weeks ago I was asked by my colleague to give him some clues and tips on how to become a Cloud Security Architect, as that's the venture he wants to follow and he knows I've been in architect-alike roles for a while.

Knowing how much fulfillment one can get from a good career and work-life, I've had decided to sit down and write down some tips right-away. I did share it with him, but then I've had looked at it myself and I've come to realize that instead of a few tips, I…

Continue

Added by Dawid Bałut on December 23, 2019 at 8:06pm — No Comments

Data Lifetime Problems and Propagation

Data Lifetime is a system problem

Any piece of software we build has a possibility of being vulnerable to either a known flaw or a zero day vulnerability. Using such malicious parties will continue to gain access to the machine. Although it’s highly impossible to become immune to such attacks, we could build systems putting our best effort to minimize the impact of such critical compromises.…

Continue

Added by Prasanna V Balaji on December 23, 2019 at 12:30pm — No Comments

Is Penetration Testing on your 2020 To-Do List?

If you’re thinking that the industry you’re operating in is safe from cybersecurity threats then you might have to think again. In this article, we’ll specifically discuss the implications of breaches on healthcare businesses and why is annual penetration testing important for them.

The healthcare sector is no different when it comes to paying the price for poor security systems. Information security experts warn…

Continue

Added by Ray Parker on December 19, 2019 at 12:18pm — No Comments

700K Amex Customer Data Exposed: What You Need To Know

A recently disclosed data leak impacts around 700,000 AmEx India customers, exposing Personally Identifiable Information (PII) like Names, Emails & Telephone numbers. This leak highlights the perils of Shadow IT, and why organizations should look into building a continuous digital risk monitoring program. Here’s a brief on what you need to know:

What Was Exposed?

An unprotected MongoDB instance, containing nearly 3 Million…

Continue

Added by pritha on December 19, 2019 at 12:00pm — No Comments

Top 6 Vendors in Next-generation Firewall market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for firewall vendors, users and practitioners to innovate, educate and discuss around the current security landscape.



A Next-Generation Firewall (NGFW) is an integrated network platform that combines a traditional firewall with application specific granular controls to help them detect application specific attacks. They help detect attacks through…

Continue

Added by pritha on December 19, 2019 at 11:00am — No Comments

Gartner Predicts 30% Of Breaches Due To Shadow IT by 2020

This article delves into the risk Shadow IT poses. In a recent report Gartner predicted 30% of breaches due to Shadow IT, this further brings the focus to this topic. Let’s take a look at the report and a few mitigation strategies

1.What Gartner Predicted About Shadow IT

Gartner’s Top Security Predictions in 2016 predicted ‘By 2020, a third of successful attacks experienced by enterprises will be on their shadow IT…

Continue

Added by pritha on December 19, 2019 at 11:00am — No Comments

(Round Table) Shadow IT Risks And Controls : Managing The Unknown Unknowns In Deep & Dark Web

round table ciso

We were happy to participate in a community round table organized by CISO Platform

Key Discussion Points : 

  • What is Shadow IT?
  • What are the types of Shadow IT?
  • Practical demo using open source tools
  • Controls to manage shadow IT risk

Reason Of Risk…

Continue

Added by pritha on December 19, 2019 at 11:00am — No Comments

Credential Stuffing: 8.7 Identity-Record Data Are On Surface, Deep & Dark Web

Credential stuffing is a method that hackers use to infiltrate a company’s system by automated injection of breached username & password pairs. Attackers use credentials to bypass anti-spam and firewall devices and access users accounts. Once they were inside the company network, they can send phishing emails or compromise company systems/data. Note that attackers just need to gain access to only a few accounts, or just one admin account to compromise the system. According…

Continue

Added by pritha on December 18, 2019 at 2:00pm — No Comments

Analysing/Dissecting Uber Subdomain Takeover Attack

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized or has been migrated/deleted. In this blog, we will be dissecting Uber Subdomain takeover vulnerability which was further escalated to authentication bypass of all ube subdomains.

For example,…

Continue

Added by pritha on December 18, 2019 at 12:30pm — No Comments

3 Ways to Manage Enterprise Shadow IT

Gartner predicted that shadow IT is 30 to 40 percent of IT spending in large enterprises, and Everest Group predicted that it can be 50 percent or more of IT Spending. This indicates that a lot of IT spendings are being bypassed to IT department. How to manage enterprise Shadow IT has become a big concern for a lot of organisations.

Because of rapid growth in SaaS and cloud products/services used by enterprises, shadow IT now can operate securely at scale.…

Continue

Added by pritha on December 18, 2019 at 12:30pm — No Comments

Top 4 Best Practices To Manage Shadow IT

Here is a small list of the major policies and best practices to manage Shadow IT

Policies To Have

1.Have A Shadow IT Policy

Create a policy document that takes care of the major areas of Shadow IT Management. This will make sure all company assets and services get registered on a single repository from and all major data sharing gets accounted for including an organization’s…

Continue

Added by pritha on December 18, 2019 at 12:30pm — No Comments

Gartner’s Top 3 Articles On Shadow IT

Continue

Added by pritha on December 18, 2019 at 12:00pm — No Comments

Risks of Shadow IT in Financial Services Firms

Organizations across all Financial Services firms are dealing with the effects of shadow IT, whether they realize it or not. Shadow IT is technology that is adopted and deployed by business units without the knowledge or consent of corporate IT teams.

The motivations behind the adoption of shadow IT are typically well-intentioned. For financial services firms, the risks of shadow IT are amplified due to the value of the data their organizations possess, and the strict…

Continue

Added by pritha on December 18, 2019 at 12:00pm — No Comments

As the name suggest “Digital Footprint”, it’s the unique traces of your digital presence. As per wikipedia, “ Digital Footprint refers to one’s unique set of traceable digital activities, actions, co…

As the name suggest “Digital Footprint”, it’s the unique traces of your digital presence. As per wikipedia, “ Digital Footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.” Here in this blog we will emphasise on how to manage enterprise digital footprint.

An Enterprise Digital Footprint, is an inventory of all the digital assets over internet…

Continue

Added by pritha on December 18, 2019 at 11:04am — No Comments

4 Ways To Manage Enterprise Digital Footprint

As the name suggest “Digital Footprint”, it’s the unique traces of your digital presence. As per wikipedia, “ Digital Footprint refers to one’s unique set of traceable digital activities, actions, contributions and communications that are manifested on the Internet or on digital devices.” Here in this blog we will emphasise on how to manage enterprise digital footprint.

An Enterprise Digital Footprint, is an inventory of all the digital assets over internet…

Continue

Added by pritha on December 18, 2019 at 11:00am — No Comments

How Missing Continuous Monitoring Makes Third-Party Risk Management Programs Ineffective

Many organizations have hundreds of vendors and the Third-Party risk exposure is one of the biggest threats. Most of the organizations depend upon partners, vendors, suppliers, contractors and other third-parties for day-to-day operations. Each of them presents some potential risk to the organization.

Third-Party Risk Management programs helps in assessing the cybersecurity of vendors/3rd parties that handle an organization’s sensitive data or…

Continue

Added by pritha on December 18, 2019 at 10:30am — No Comments

Third-Parties: Risks & Threats Associated With Them

Third-Party risks are more as the Third-Party breaches continue to dominate and these breaches are expensive to organizations. Third-parties are those companies that you directly work with such as data management companies, law firms, e-mail providers, web hosting companies, subsidiaries, vendors, sub-contractors. Third-Parties are  basically any organization, whose employees or systems have access to your systems/ data. However,…

Continue

Added by pritha on December 18, 2019 at 10:00am — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */