Featured Blog Posts (137)

9 Critical Capabilities For Digital Risk Protection Program

Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purchasing DRP tools as net-new solutions for their organizations (as opposed to replacing an existing capability). They’re adding DRP to their existing security technology stacks to better tackle digital risk activities — namely, to improve…


Added by CISO Platform on October 24, 2019 at 12:41pm — No Comments

How mature is your Application Security Program?

Business applications are vital for the successful functioning of any organization. Therefore, managing their information security risks are just as important as the business itself. If I ask about different measures you take to ensure security of your applications, you might reply with few initiatives such as periodic secure code reviews, external scans, vulnerability assessments & penetration testings and perhaps audits etc. But what If I asked how…


Added by Pushkal Mishra on August 30, 2019 at 7:00pm — No Comments

Learn More About the Key Use Cases Of Network ATP Technology

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.

Advance threat protection is not about a single security solution, It is about a combination of security…


Added by CISO Platform on September 4, 2019 at 12:37pm — No Comments

How to choose your Security / Penetration Testing Vendor?

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization. Another reason to hire a security testing company is that one may find it difficult to hire and retain Penetration Testers.…


Added by CISO Platform on September 3, 2019 at 9:30am — No Comments

Top 10 SIEM Log Sources in Real Life?

[cross-post from Anton on Security blog]…


Added by Dr. Anton Chuvakin on August 27, 2019 at 4:00am — No Comments

[Security Operations Analysis] Chapter 2: Information Security Incident Response

Hi CISO This is the Chapter 2 Information Security Incident Response. It is a part of Security Operations Analysis - Crowdsourcing eBook on Peerlryst - Click Here


Identifying and responding…


Added by Mohamed marrouchi on August 23, 2019 at 6:30pm — No Comments

How to Manage Security & Third Party/Open Source Code in the SDLC


It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.

With any security program, the goal is to identify the vulnerabilities, the related risks, mitigations or compensating controls that can be implemented. With the volume of development including libraries and binaries from third-party/open source repositories like: Git-Hub,…


Added by Drew Brown on August 15, 2019 at 7:30pm — No Comments

The Legal Case for Capital One AWS Security Breach + A Short Synopsys

Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers ... The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened.

The legal case built was quite interesting. Before I share the legal case link heres a short summary just in-case you dont know…


Added by CISO Platform on August 6, 2019 at 12:30pm — No Comments

(Panel Discussion) Shadow IT: You Cannot Protect What You Can’t See

This is a summary of the panel discussion at Security Symposium & Cyber Sentinel Award by Infocon global. The panel discussion was moderated by Jitendra Chauhan (Head of Engineering at FireCompass) along with Balaram (CISO, Manthan), Ananth Kumar Ms (Head-IT Assurance & Security, Janalaxmi Financial Services), Sumanth Naropanth and Ramakrishna Roy.…


Added by CISO Platform on August 4, 2019 at 9:00am — No Comments


Phishing attack allows attackers to steal user’s credentials

By now I am sure we have all seen the commercials of people walking up to their ATMs and taking cash out without physically touching the ATM machine. It is a feature known as “Cardless ATM banking” and has been adopted and used by several banking and financial institutions who boast about the faster transaction times (about 15 seconds from start to finish). Cardless ATM allows banking…


Added by Davin A Jackson on August 2, 2019 at 7:30pm — No Comments

(Breach) NASA Hacked : Why It Happened & What Can You Learn?

(NASA Hacked) On 21 June, 2019 major news channels disclosed a major hack on NASA. Hackers were able to gain unauthorized access using Raspberry Pi and stole ‘Mars Mission Data’ and breached ‘NASA’s satellite dish network’. This happened around April 2018 and went unnoticed for for almost a year. It is advisable to do an attack surface analysis for an organization to have a know-how of all the access and assets.…


Added by pritha on July 11, 2019 at 1:13pm — No Comments

Best Of The World Webinar : Dark Future Of Privacy By Menny Barzilay

How do tech companies manipulate the way people think? What would a top-secret Russian agency do to affect the outcome of the US presidential elections? Can systems today analyze people’s behavior to the point where they can predict every move they’ll make?

Watch Webinar : …


Added by pritha on July 25, 2019 at 1:00pm — No Comments

Webinar: 5 Shocking Results From Hidden Internet - Exposed Database,Leaked Passwords, Code Leaks & more

In recent past there have been some major breaches and some key reasons responsible for the breach were Shadow IT, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches happened, like American Express, Uber, Dropbox, Dunkin Donuts, British Airways & many more. FireCompass product & their research team continouosly monitor the web (surface,deep,dark) to understand the leaked credentials, pattern of data loss etc... this…


Added by pritha on April 26, 2019 at 5:30pm — No Comments

100 Top Security Influencers To Follow In 2019

We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 4 categories – CISO, Tech Leaders, Ethical Hackers and Media/Analyst. 

As a part of our …


Added by CISO Platform on December 11, 2018 at 4:30pm — No Comments

Checklist: Litmus Test & Beyond for Cyber Security Incident

The cyber incident of the Coop Bank heist of over Rs. 94 Cr compromised to cyber-criminals is a “wake-up” call not only for the entire Banking Sector but every technology services company and OEMs, resulting organizations are taking necessary action to protect their Information Technology Infrastructure, with an intention to reduce the Information Security risk and at the same time working on how to mitigate reputation risk at their respective…


Added by Milind Rajhans on September 3, 2018 at 8:00pm — No Comments

Executive Summary to Build Enterprise Security Architecture Governance Program

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…


Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments

(20 Page Guide) Critical Capabilities For Evaluating WAF - Web Application Firewall

With the increased growth in the usage of the internet, mobile applications, and the Internet of Things, applications become ubiquitous but their security is low key. Deploying an effective WAF will be one of the baseline measures organizations can take to protect themselves from breaches and secure their customers.…


Added by CISO Platform on July 25, 2018 at 12:00pm — No Comments

Incident Response: How To Respond To A Security Breach During First 24 Hours (Checklist)

Incident Response is pretty much the same, however the first few hours can be vital and only high priority actions can save the situation. Since this is a Security Breach, it is of highest priority and must be treated at highest escalation level.

Checklist To Respond To A Security…


Added by pritha on July 2, 2015 at 12:30am — No Comments

Top 10 talks on Cloud Security & Virtualization from RSA Conference USA 2018

We have handpicked the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees experienced keynotes, peer-to-peer sessions,…


Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments

Top 7 talks for Analytical Intelligence & Response from RSA Conference USA 2018

Our editorial team has handpicked the best of the best talks at RSA Conference - one of the largest IT Security Conference in the world. Following is the list of top talks on Cloud Security & Virtualization at RSA Conference USA 2018.

RSA Conference held its event in San Francisco, CA at the Moscone Center & Marriott Marquis and brought together a record number of 50,000 attendees.Attendees…


Added by Y R Chandra Sekhar Varma on June 8, 2018 at 11:30am — No Comments

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service