Featured Blog Posts (135)

Learn More About the Key Use Cases Of Network ATP Technology

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.

Advance threat protection is not about a single security solution, It is about a combination of security…

Continue

Added by CISO Platform on September 4, 2019 at 12:37pm — No Comments

How to choose your Security / Penetration Testing Vendor?

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization. Another reason to hire a security testing company is that one may find it difficult to hire and retain Penetration Testers.…

Continue

Added by CISO Platform on September 3, 2019 at 9:30am — No Comments

Top 10 SIEM Log Sources in Real Life?

[cross-post from Anton on Security blog]

One of the most common questions I received in my analyst years of…

Continue

Added by Dr. Anton Chuvakin on August 27, 2019 at 4:00am — No Comments

[Security Operations Analysis] Chapter 2: Information Security Incident Response

Hi CISO This is the Chapter 2 Information Security Incident Response. It is a part of Security Operations Analysis - Crowdsourcing eBook on Peerlryst - Click Here

Abstract

Identifying and responding…

Continue

Added by Mohamed marrouchi on August 23, 2019 at 6:30pm — No Comments

How to Manage Security & Third Party/Open Source Code in the SDLC

Background:

It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.



With any security program, the goal is to identify the vulnerabilities, the related risks, mitigations or compensating controls that can be implemented. With the volume of development including libraries and binaries from third-party/open source repositories like: Git-Hub,…

Continue

Added by Drew Brown on August 15, 2019 at 7:30pm — No Comments

The Legal Case for Capital One AWS Security Breach + A Short Synopsys

Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers ... The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened.

The legal case built was quite interesting. Before I share the legal case link heres a short summary just in-case you dont know…

Continue

Added by CISO Platform on August 6, 2019 at 12:30pm — No Comments

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

This is a summary of the panel discussion at Security Symposium & Cyber Sentinel Award by Infocon global. The panel discussion was moderated by Jitendra Chauhan (Head of Engineering at FireCompass) along with Balaram (CISO, Manthan), Ananth Kumar Ms (Head-IT Assurance & Security, Janalaxmi Financial Services), Sumanth Naropanth and Ramakrishna Roy.…

Continue

Added by CISO Platform on August 4, 2019 at 9:00am — No Comments

BEWARE OF CARDLESS ATM HACK

Phishing attack allows attackers to steal user’s credentials

By now I am sure we have all seen the commercials of people walking up to their ATMs and taking cash out without physically touching the ATM machine. It is a feature known as “Cardless ATM banking” and has been adopted and used by several banking and financial institutions who boast about the faster transaction times (about 15 seconds from start to finish). Cardless ATM allows banking…

Continue

Added by Davin A Jackson on August 2, 2019 at 7:30pm — No Comments

(Breach) NASA Hacked : Why It Happened & What Can You Learn?

(NASA Hacked) On 21 June, 2019 major news channels disclosed a major hack on NASA. Hackers were able to gain unauthorized access using Raspberry Pi and stole ‘Mars Mission Data’ and breached ‘NASA’s satellite dish network’. This happened around April 2018 and went unnoticed for for almost a year. It is advisable to do an attack surface analysis for an organization to have a know-how of all the access and assets.…



Continue

Added by pritha on July 11, 2019 at 1:13pm — No Comments

Best Of The World Webinar : Dark Future Of Privacy By Menny Barzilay

How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can systems today analyze people’s behavior to the point where they can predict every move they’ll make?

Watch Webinar : …

Continue

Added by pritha on July 25, 2019 at 1:00pm — No Comments

Webinar: 5 Shocking Results From Hidden Internet - Exposed Database,Leaked Passwords, Code Leaks & more

In recent past there have been some major breaches and some key reasons responsible for the breach were Shadow IT, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches happened, like American Express, Uber, Dropbox, Dunkin Donuts, British Airways & many more. FireCompass product & their research team continouosly monitor the web (surface,deep,dark) to understand the leaked credentials, pattern of data loss etc... this…

Continue

Added by pritha on April 26, 2019 at 5:30pm — No Comments

100 Top Security Influencers To Follow In 2019

We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 4 categories – CISO, Tech Leaders, Ethical Hackers and Media/Analyst. 

As a part of our …

Continue

Added by CISO Platform on December 11, 2018 at 4:30pm — No Comments

Checklist: Litmus Test & Beyond for Cyber Security Incident

The cyber incident of the Coop Bank heist of over Rs. 94 Cr compromised to cyber-criminals is a “wake-up” call not only for the entire Banking Sector but every technology services company and OEMs, resulting organizations are taking necessary action to protect their Information Technology Infrastructure, with an intention to reduce the Information Security risk and at the same time working on how to mitigate reputation risk at their respective…

Continue

Added by Milind Rajhans on September 3, 2018 at 8:00pm — No Comments

Executive Summary to Build Enterprise Security Architecture Governance Program

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…

Continue

Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments

(20 Page Guide) Critical Capabilities For Evaluating WAF - Web Application Firewall

With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can take to protect themselves from breaches and secure their customers.…

Continue

Added by CISO Platform on July 25, 2018 at 12:00pm — No Comments

Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

Incident Response is pretty much the same, however the first few hours can be vital and only high priority actions can save the situation. Since this is a Security Breach, it is of highest priority and must be treated at highest escalation level.

Checklist To Respond To A Security…

Continue

Added by pritha on July 2, 2015 at 12:30am — No Comments

Top 10 talks on Cloud Security & Virtualization from RSA Conference USA 2018

We have handpicked the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions,…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments

Top 7 talks for Analytical Intelligence & Response from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees…

Continue

Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments

CISO Guide: Surface Web, Deep Web and Dark Web - Are they different?

There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through search engines or standard means. Deep Web is the internet that cannot be accessed through standard search engines or the pages that are not indexed in any way.…

Continue

Added by Y R Chandra Sekhar Varma on April 19, 2018 at 11:30am — No Comments

3 Free "Security Architecture" Related Resources !!

Here's some exciting content on security architecture. It includes tools for Data Protection, Incident Response Tool Qualification & more. There's a great conference for security builders too - SACON…
Continue

Added by pritha on April 30, 2017 at 12:00pm — No Comments

Featured Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service