Social Network For Senior Security Executives
We were excited to have the head of engineering, FireCompass (Jitendra Chauhan) with us. He shares with us insights from his team's 12 month monitoring of the hidden internet that led to some shocking results.
Key Points Of Focus :
- Major causes of recent breaches
- Results from indexing the deep, dark & surface web
(Exposed database, Leaked passwords, Code leaks, Open cloud resources, Exposed network…
Added by pritha on April 26, 2019 at 5:30pm — No Comments
We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 4 categories – CISO, Tech Leaders, Ethical Hackers and Media/Analyst.
As a part of our …Continue
Added by CISO Platform on December 11, 2018 at 4:30pm — No Comments
The cyber incident of the Coop Bank heist of over Rs. 94 Cr compromised to cyber-criminals is a “wake-up” call not only for the entire Banking Sector but every technology services company and OEMs, resulting organizations are taking necessary action to protect their Information Technology Infrastructure, with an intention to reduce the Information Security risk and at the same time working on how to mitigate reputation risk at their respective…Continue
Added by Milind Rajhans on September 3, 2018 at 8:00pm — No Comments
This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…
Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments
With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can take to protect themselves from breaches and secure their customers.…Continue
Added by CISO Platform on July 25, 2018 at 12:00pm — No Comments
Incident Response is pretty much the same, however the first few hours can be vital and only high priority actions can save the situation. Since this is a Security Breach, it is of highest priority and must be treated at highest escalation level.
Checklist To Respond To A Security…Continue
Added by pritha on July 2, 2015 at 12:30am — No Comments
We have handpicked the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.
RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions,…Continue
Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments
Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.
RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees…Continue
Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments
There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through search engines or standard means. Deep Web is the internet that cannot be accessed through standard search engines or the pages that are not indexed in any way.…Continue
Added by Y R Chandra Sekhar Varma on April 19, 2018 at 11:30am — No Comments
Added by pritha on April 30, 2017 at 12:00pm — No Comments
Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass
Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments
There are four phases in Cyber Crisis Management, namely Detection, Response, Containment &amp; Recovery. Here is a glimpse of the four phases.
Added by CISO Platform on April 29, 2017 at 10:00pm — No Comments
These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:
It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute its cloud based or on premise Mobile Application Development Platform (MADP).
Added by Amit, CISO Platform on April 10, 2017 at 8:00pm — No Comments
This article gives a 5 principal steps and questions one must solicit the emergency from the cyber security incident response steps. This includes the incident, the control points, plan of action, communication, business impacts.…Continue
Added by pritha on February 18, 2017 at 12:30pm — No Comments
Ransomware is a type of malware that encrypts everything on your system with a cryptographic algorithm and holds that encrypted data hostage for ransom. It demands the user to pay for the decryption key. There are two types of ransomware. The first type encrypts all data on the system and renders it nearly impossible to decrypt without the key. The second type simply locks the system and demands to enter the key for data decryption but does not encrypt data itself.…Continue
Added by pritha on February 16, 2017 at 1:30pm — No Comments
RSA conference is one of the leading security conferences worldwide with 700+ vendors at the Expo, which creates some unique challenges for security professionals. Some of the challenges @RSAC Expo are as below:
Added by Amit, CISO Platform on February 15, 2017 at 5:00pm — No Comments
2016 will go in history as the year CyberCriminals made fortune by using vulnerabilities found in technology and moreover exploiting human weaknesses. The infamous CEO Scam brought billions of dollars to CyberCriminals. I had written a separate post to handle this crime, more details can be found here…Continue
Added by Vikas Arora on February 2, 2017 at 10:30am — No Comments
The mobility explosion is the big bang that keeps expanding. It moved from stages like laptop, blackberry, touch based devices, tablets & more. The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untethered power of smartphones, tablets, and other portable devices. Employees expect the flexibility to work on the devices they choose, and employers have come to expect always-on availability. That business requirement often conflicts with…Continue
Added by pritha on January 16, 2017 at 5:00pm — No Comments
CISO Platform Annual Summit @ Goa, last week saw over 100+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.
International Experts like CTO of Xerox, Black Hat Review Board Member, Ex-CISO at Israeli…Continue
Added by Gireesh Kumar on December 6, 2016 at 12:30pm — No Comments
Speaker: Satish K Sreenivasaiah, Lead Architect @ TCS …
Added by Gireesh Kumar on November 14, 2016 at 4:30pm — No Comments