All Blog Posts (1,376)

Risks and Opportunities provided by Cyber Domain and Policy-needs to address the Cyber Defense

The term ‘Cyber Domain’ has been used widely by various experts, sometimes interchangeably with ‘Cyber Space’, to imply – “the global domain within the information environment that encompasses the interdependent networks of information technology infrastructures, including the internet and telecommunication networks” (Camillo & Miranda, 2011). Today it has become “the fifth domain of warfare after land, sea, air and space and its a challenge to have a common definition of cyber Domain”…

Continue

Added by Sandeep Mittal, IPS on March 17, 2015 at 9:00am — No Comments

Intelligence Driven Security - SIEM & Beyond

Watch Video: (Webinar) Intelligence Driven Security - SIEM & Beyond

( Read more:  Checklist to Evaluate a DLP Provider )

What will you…

Continue

Added by CISO Platform on March 16, 2015 at 11:30am — No Comments

Pre-launch Preview: State of Security Technology Adoption in Enterprises - Annual Report 2015

We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking, in which 410 companies have participated in the enterprise segment. This is a preview of the key findings on the implementation of various security technologies.

The data has been collected through the survey conducted online through the "5th Top 100 CISO Awards,…

Continue

Added by CISO Platform on March 12, 2015 at 5:30pm — No Comments

Highlights from Community Breakfast Series on CISO Platform Index (CPI) and Vendor Evaluation Checklist

We are thrilled to have received so many wonderful ideas and suggestions during the breakfast series specifically focusing on CPI findings. Here are the quick highlights!

What was the objective of the Community Breakfast?

  • Preview of CPI Findings: To present the findings and the rating done by the CISO Platform Community for various products until now. Security officers at the meet were the first to…
Continue

Added by pritha on February 25, 2015 at 1:30pm — No Comments

RIoT : Raiding Internet of Things

Watch Video: (Webinar) RIOT( Raiding Internet Of Things)

(Read more:  Annual Survey on Cloud Adoption Status Across Industry Verticals)…

Continue

Added by pritha on February 23, 2015 at 2:17pm — No Comments

SAP NetWeaver ABAP Security Configuration Part 3: Unnecessary Functionality

Third critical area. Unnecessary functionality

What is the most common problem of any more or less complex application? In essence, they almost always have numerous unnecessary functions aimed to perform multiple tasks. 

Obviously, that makes the whole system vulnerable. The more functionality is available, the higher becomes the number of vulnerabilities. "Complexity Kills Security" 

More importantly, all those functions are enabled by default right from the…

Continue

Added by Alexander Polyakov on February 11, 2015 at 3:33pm — No Comments

SAP NetWeaver ABAP security configuration part 2: Default passwords for access to the application

Second critical category. Default passwords for access to the application



For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaws - the first critical category in our list. As you should have probably guessed, today it’s time we take a closer look at the next item from our list of critical issues - default passwords.

It is a wide reaching…

Continue

Added by Alexander Polyakov on February 2, 2015 at 9:30pm — No Comments

Big Data Security Challenges and Recommendations!

This is a great Big Data webinar(15 min), hosted by CISO Platform and briefly points out the Security Challenges and also Recommends Some Fixes. It is presented by Head of Development at Iviz.

What will you learn:

- Key Insights on Existing Big Data Architecture

- Unique Security Risks and Vulnerabilities of Big Data Technologies

- Top 5 Solutions to mitigate these security challenges…

Continue

Added by pritha on February 2, 2015 at 5:30pm — No Comments

Man in the Browser Attacks on Online Transactions & Prevention Strategies

This is a great Man In the Browser Attack webinar(15 min), hosted by CISO Platform and briefly points out the Risks and also Recommends Some Fixes. It is presented by the CTO at Iviz. MiTB being particularly important for banking and finance Industry.

What will you learn?



- Learn why MiTB attacks pose a high risk to online banking and why is it hard to detect

- How Man In…

Continue

Added by pritha on February 2, 2015 at 5:30pm — No Comments

Top Information Security Checklists, Guides and Articles that our members loved the most !





2014 has been a great year at CISO Platform. We had around 1500 new senior executives joining the platform and published 120 new articles on security. Here are some of the best ones from 2014.

Top Security Checklists & Guides:
 …
Continue

Added by pritha on January 31, 2015 at 6:00pm — No Comments

5 Real ways to destroy business by breaking SAP Applications

Watch Video:

5 Real ways to destroy business by breaking SAP Applications

Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

Hacking Exposed:Why Current Security Solutions Fail

Here is an interesting webinar on the 'Insecurities of Security Products'. More often we consider the security vulnerabilities in products apart from security products. It is ironic how a product devised to provide security can also make you more susceptible to compromise. How-So will be demonstrated through a few examples.

3 Industry experts had joined us in this webinar-

  • Stuart McClure, Ex-CTO at McAfee & Lead author of 'Hacking…
Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

BadUSB — On accessories that turn evil by Karsten Nohl

Watch Talk:

(Read more:  5 Best Practices to secure your Big Data Implementation)

BadUSB — On accessories that…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

Ants and Elephants in the CISO's Office

Watch Video:

(Read more:  Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)

Ants and Elephants in the…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

Microsoft vs Apple: Which OS is more secure?

Contrary to the common man belief that 'Windows is very insecure', Microsoft has been very proactive in security. Apple iOS has a great deal of security too, it is described in its building from scratch in the iOS security document. Here are the few points I found great for mention. Here's a small video which has the debate on.

Watch video[9 min]:…

Continue

Added by pritha on January 31, 2015 at 5:30pm — No Comments

SAP NetWeaver ABAP Security Configuration Part 1: Patch Management

First critical issue. Patch management flaws

In our previous articles we’ve already introduced you to the list of the 9 most important business application security critical issues. We’ve also had a chance to present to you the skeleton of our guideline with its 33 security assessment steps. As you’ve seen only the skeleton of it, now it’s high time to pay attention to a more detailed explanation of each step to be taken.

In order to insure full-scale system security it…

Continue

Added by Alexander Polyakov on January 26, 2015 at 10:00pm — No Comments

5 Major Types Of Hardware Attacks You Need To Know



From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar discussing the hardware threats.

Part 1: Major Hardware Attacks…

Continue

Added by pritha on January 13, 2015 at 6:00pm — No Comments

Learning Practical Forensics-Tools & Techniques

A concise primer to Forensics for a beginner or a security expert- an insight into actual solution achieved through Forensics. The problem states a PGP message intercepted by an RAT and needs to be decrypted without the actual key? The process is briefly defined by the expert himself and takes us through a Forensic lab without the pain ofcourse. 

Part1 :Forensics Video Recording…

Continue

Added by pritha on January 13, 2015 at 5:00pm — No Comments

OS Security Evolution & Latest Attack Vectors

Watch Video: (Webinar) OS Security & Latest Attack Vectors

(Read more:  Top 5 Big Data Vulnerability Classes)

Quick…

Continue

Added by pritha on January 13, 2015 at 5:00pm — No Comments

How to Embed Risk Assessment into your Project Workstream

(Read more: Checklist to Evaluate IT Project Vendors)

How to Embed Risk Assessment into your Project Workstream by Michael Calderin - Security Officer, Bupa Global Latin America

Position…

Continue

Added by CISO Platform on January 9, 2015 at 5:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service