Social Network For Senior Security Executives
2016 will go in history as the year CyberCriminals made fortune by using vulnerabilities found in technology and moreover exploiting human weaknesses. The infamous CEO Scam brought billions of dollars to CyberCriminals. I had written a separate post to handle this crime, more details can be found here – …Continue
Added by Vikas Arora on February 2, 2017 at 10:30am — No Comments
This project mainly aims to have an enterprise wide ITAM (IT Asset Management) Systems and endpoint protection and also to maintain the hardware and software inventory. It also brought in centralized IT management and control mechanisms for polices enforcement, monitoring and reporting to present a complete picture of endpoint status of the organization.
(Read more: …Continue
Added by pritha on October 21, 2014 at 2:30pm — No Comments
The New-Gen Mobile World
Web 2.0 applications and Social Networking have reshaped the Web from a static resource into a content-driven world with rich multimedia and dynamic updates, putting the Web into a constant state of flux. Gone are the days where simple URL libraries were sufficient at controlling appropriate Web access. Today’s Web filtering solutions need to be able to…Continue
Added by Raghu on February 21, 2014 at 11:00am — No Comments
Now this is a very subjective term as “Right” to each is quite different. More so, the subject “Information Security” by itself is quite a dynamic and an evolving term. Here, any measure stick with constant attributes may not provide a true insight for the choice of Technology. However, certain parameters of the selection process can be generalized for operational efficiency.
(Read more: …Continue
Added by CISO Platform on August 27, 2013 at 4:30pm — No Comments
APT (Advanced Persistent Threats) is the talk of the town. There is too much of noise and confusion. Everybody wants to make money. Quite a few uses FUD (Fear Uncertainty and Doubt) to sell their products. I wanted to highlight the APT secrets which vendors don't tell (well mostly).
There is no single solution for APT
APT is a like a war. No single solution is good enough. You cannot have a solution to your APT problem.…Continue
Added by bikash on April 20, 2013 at 10:30am — No Comments
Added by CISO Platform on July 5, 2012 at 4:00pm — No Comments