CISO Platform's Blog (172)

Webinar-Under The Hood Of Deception Technologies

What will you learn:

  • How is deception technology different from honeypots ?
  • Deception v/s EDR, UEBA and NTA
  • A hacker’s view of deception across the kill-chain
  • Key technology capabilities or key components of deception technology

 

About Speaker:…

sahir-hidayatullah-ceo-smokescreen-.original

Continue

Added by CISO Platform on November 29, 2019 at 2:30pm — No Comments

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

  • Equifax hack needs no introduction. One third of American lost their social security number due to this single breach. Here’s some of the top mistakes/learning from Equifax breach from my perspective. I would invite all of you to also add your comments and thoughts.

 

1. Patch on time (Yawn ..)

  • Most of the breaches happen not because…
Continue

Added by CISO Platform on November 29, 2019 at 2:27pm — No Comments

India Security Buying Priority Report (2017) & FireCompass Top Products & Popular Comparisons



India Security Buying Priority Report (2017) & FireCompass Top Viewed Products, Popular Comparisons https://www.firecompass.com/wp-content/uploads/2017/10/StateOfSecurityTechnologyBuyingInEnterprises2.jpg 750w" sizes="(max-width: 777px) 100vw, 777px" />

 

  • We are happy to announce the results of the annual survey of Security Buying Priority in which 350+ Companies have participated in the enterprise segment. This is a study of the key findings on the buying of…
Continue

Added by CISO Platform on November 29, 2019 at 2:23pm — No Comments

Understanding Surface Web, Dark Web, Deep Web and Darknet

  • Well if you are a tech enthusiast, you must have come across these words just like I have a lot of times! But I had never looked so deeply into finding out the differences as I thought deep web and darknet are the same, but it’s not. So, let’s understand the difference between Surface Web, Deep Web, Dark Web and Darknet. Also understand what darknet browsers are needed to enter darkweb and darknet.

 

What is Surface Web?

  • Let me tell…
Continue

Added by CISO Platform on November 29, 2019 at 2:20pm — No Comments

Blokchain Drives Authentication and Cryptography to next Dimension

What is Blockchain?

  • Conventionally, we had a habit of maintaining everything in a centralized repository and safeguarding it by applying perimeter security. Blockchain is a current breakthrough technology which eliminates centralized concept and show cases the shared, distributed updated records of who is doing what. Although it is decentralized, it supports access rights and is secured by nature. Being immutable as one of its characteristics, it gives us more…
Continue

Added by CISO Platform on November 29, 2019 at 2:14pm — No Comments

Top Cyber Attacks in India and Mitigation Techniques

  • Indian enterprises are rapidly moving to the digital realm, which makes it extremely important to have a well-defined cyber security strategy. This will help flush out many risks and minimize the impact of any possible breaches. To protect ourselves, we need to also look into the attacks that were carried out in the past, what kind of information was sought out for, attack patterns, common vulnerabilities that were targeted etc.

 

  • This report on the…
Continue

Added by CISO Platform on November 29, 2019 at 2:11pm — No Comments

“Digital Gold” – Here’s Everything ,You Should Know About BitCoins

  • Bitcoins are one of the most popular cryptocurrency which is growing rapidly for one of its unique feature where Nobody controls the transactions physically.

 

Prologue  

  • It was on November 8, 2016 when the Prime Minister Narendra Modi broke the news of Demonetization and billions of Indians were gobsmacked, and gradually many things happened. Lines snaked around the ATM’s, few political parties…
Continue

Added by CISO Platform on November 29, 2019 at 2:08pm — No Comments

Top 5 Vulnerability Assessment Vendors for Q1 2017

  • Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. This article provides you a list of popular Vulnerability assessment vendors for Q1 2017.

 

  • Here are the top 5 Vulnerability assessment vendors…
Continue

Added by CISO Platform on November 29, 2019 at 2:00pm — No Comments

Top 5 Privileged Access Management (PAM) Vendors for Q1 2017

  • A privileged access management technology needs to accommodate for the special needs…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best Encryption Softwares for Q1 2017

  • Encryption is a process of protecting your sensitive data by converting it into encoded information which could be read only with a key. Endpoint Encryption ensures data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. This article provides you a list of Best Encryption Softwares for Q1 2017.

 

  • Here are the Top 5  Encryption Vendors to watch out…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best DDoS Tools (Distributed Denial of Service) for Q1 2017

  • Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

Top 5 Managed Security Service Provider (MSSP) for Q1 2017

  • Security services of a network are often outsourced to an outside or third party service provider. Such an outsourced security service is called Managed Security Services (MSS) and the service provider provider is called Managed Security Service Provider (MSSP). This article provides you a list of top 5 Managed Security Service Provider (MSSP) for Q1 2017.

 

  • Here are the top 5 Managed Security Service Provider (MSSP) to watch out…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

Top 5 Unified Threat Management (UTM) Vendors for Q1 2017

  • Unified Threat Management (UTM) is an all in one security solution that integrates firewalls, anti-viruses, content filtering, spam filtering, VPN protection, anti-spyware and other security system you need to protect your network. It can perform many security functions simultaneously to provide layered protection to all sizes of organization. This article provides you a list of top 5 Unified Threat Management (UTM) Vendors for Q1 2017.

 

  • Here are the top 5…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best DDoS Tools (Distributed Denial of Service) for Q1 2017

  • Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for…
Continue

Added by CISO Platform on November 29, 2019 at 1:28pm — No Comments

Top 5 Network Advanced Threat Protection (ATP) Solutions for Q1 2017

Continue

Added by CISO Platform on November 29, 2019 at 1:24pm — No Comments

Top 5 Emerging Vendors providing DNS Security

  • Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.

 

What is DNS (Domain Name System)?

  • DNS (Domain Name System) is the most important part of Internet. When entering any website’s address (e.g.…
Continue

Added by CISO Platform on November 29, 2019 at 1:20pm — No Comments

Top 5 Emerging Vulnerability Management Solutions for Q1 2017



 

  • Vulnerability Management Solutions helps to prioritize and remediate vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.). It correlate and help to prioritize the risk (some…
Continue

Added by CISO Platform on November 29, 2019 at 1:11pm — No Comments

Top 5 Emerging Vendors providing DNS Security

  • Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.

 

What is DNS (Domain Name System)?

  • DNS (Domain Name System) is the most important part of Internet. When entering any website’s address (e.g.…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Threat Hunting tools for Q1 2017

Threat Hunting?

  • Threat hunting is a proactive approach to identifying adversaries rather than reactively waiting for an alert to go off. This is an iterative process, meaning that it has to be continuously carried out in a loop, beginning with a hypothesis.…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Network Forensic tools for Q1 2017

  • Network Forensics is related to the monitoring and analysis of network traffic for the purposes of information gathering, legal evidence collection also to detect and identify any intrusion. Network investigation deals with volatile and dynamic data. Often network traffic is transmitted and can be lost thus network forensic must be a proactive process rather than just being reactive. This article…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service