CISO Platform's Blog (180)

10 Best Practices for a Secure “Home WiFi” Network

This blog at CISO Platform is written on behalf of Archie Jackson, Senior Director and Head of IT & IS at Incedo Inc.

10 Best Practices for a Secure “Home WiFi” Network

  1. Default Router Password: Access your home WiFi router settings by typing 192.168.1.1 into

    your web browser. Enter the username and password for the router. You may find it on the

    router label. Most of the home WiFi…
Continue

Added by CISO Platform on April 22, 2020 at 4:00pm — No Comments

Sample Email From CISO to the Board for Preparing for Black Swan Event

As the coronavirus pandemic continues to disrupt there is another threat that is rising by the day- the risk of cyberattacks. Work from home will suddenly change the security dynamics both from defense and offense perspective and the world is not prepared for it.

Here is a sample Email from a CISO to the Board:

Hello everybody,

I hope all of you and your family/friends…
Continue

Added by CISO Platform on April 17, 2020 at 5:30pm — No Comments

Sample Cyber Security Update For Management (COVID 19)

During the COVID 19 crisis many organizations had to shift to Work From Home in a very short notice. During this time it is very important to keep your management and team members informed. Here is a sample cyber security update for your management during the COVID 19 pandemic.




Sample Cyber Security Update For Management
I wanted to keep you all updated on the progress on cyber security posture of "Your Company" and…
Continue

Added by CISO Platform on April 17, 2020 at 5:30pm — No Comments

Work From Home Guidelines for Security (COVID19)

I hope all of you are doing well. As you are aware that as response to Coronavirus Crisis many of us had to transition to work from home.  
The bad news is that Work from home poses unique security threats and challenges. Hackers have already started exploiting the current situation. We must be very cautious. The world is in a crisis and we cannot afford to face another crisis in the cyber world.




Work From Home Guidelines for…
Continue

Added by CISO Platform on April 17, 2020 at 5:00pm — No Comments

Cyber Security Considerations Regarding Telework or Remote Work Options in COVID 19

This blog is posted on behalf of Nilesh Gavali. As organizations prepare for possible impacts of Coronavirus Disease 2019 (COVID-19), many may consider alternate workplace options for their employees. Remote work options—or telework—require an enterprise virtual private network (VPN) solution to connect employees to an organization’s information…

Continue

Added by CISO Platform on April 8, 2020 at 4:01pm — No Comments

Information Security Tips when Working from Home (COVID 19)

These Information Security Tips when Working from Home are posted on behalf of Bhushan Deo, CISO for Thermax Limited

Connection & Access

  1. Avoid connecting to unsecured Wi-Fi / networks for internet.
  2. Use…
Continue

Added by CISO Platform on April 8, 2020 at 3:49pm — 2 Comments

Check list for Work from Home Amidst COVID 19

This is posted on behalf of Ashish Khanna, Assistant Vice President - Corporate IT for EIH Limited (Oberoi Group).

Due to CORONA virus most of the organizations are allowing their employees to work form home.Here is a checklist for work from home amidst COVID-19.

Check list for Work from Home Amidst COVID…

Continue

Added by CISO Platform on April 8, 2020 at 3:30pm — No Comments

CISO Platform Annual Summit, 2020 Highlights

We wanted to share with you some of the amazing moments from “Annual Summit, India 2020” @ Bangalore on 21 & 22 Feb. We had over 700+ attendees including CISO and SACON attendees sharing knowledge through Taskforce Presentations, Panel Discussions Round Tables, Workshops and more making the conference a huge success.…

Continue

Added by CISO Platform on March 3, 2020 at 10:30am — No Comments

NATIONAL CYBER SECURITY STRATEGY 2020 (NCSS 2020)

Call for Comments

1. Need for NCSS 2020 India was one of the first few countries to propound a futuristic …
Continue

Added by CISO Platform on December 30, 2019 at 12:00pm — No Comments

Webinar-Under The Hood Of Deception Technologies

What will you learn:

  • How is deception technology different from honeypots ?
  • Deception v/s EDR, UEBA and NTA
  • A hacker’s view of deception across the kill-chain
  • Key technology capabilities or key components of deception technology

 

About Speaker:…

sahir-hidayatullah-ceo-smokescreen-.original

Continue

Added by CISO Platform on November 29, 2019 at 2:30pm — No Comments

Understanding Surface Web, Dark Web, Deep Web and Darknet

  • Well if you are a tech enthusiast, you must have come across these words just like I have a lot of times! But I had never looked so deeply into finding out the differences as I thought deep web and darknet are the same, but it’s not. So, let’s understand the difference between Surface Web, Deep Web, Dark Web and Darknet. Also understand what darknet browsers are needed to enter darkweb and darknet.

 

What is Surface Web?

  • Let me tell…
Continue

Added by CISO Platform on November 29, 2019 at 2:20pm — No Comments

Blokchain Drives Authentication and Cryptography to next Dimension

What is Blockchain?

  • Conventionally, we had a habit of maintaining everything in a centralized repository and safeguarding it by applying perimeter security. Blockchain is a current breakthrough technology which eliminates centralized concept and show cases the shared, distributed updated records of who is doing what. Although it is decentralized, it supports access rights and is secured by nature. Being immutable as one of its characteristics, it gives us more…
Continue

Added by CISO Platform on November 29, 2019 at 2:14pm — No Comments

“Digital Gold” – Here’s Everything ,You Should Know About BitCoins

  • Bitcoins are one of the most popular cryptocurrency which is growing rapidly for one of its unique feature where Nobody controls the transactions physically.

 

Prologue  

  • It was on November 8, 2016 when the Prime Minister Narendra Modi broke the news of Demonetization and billions of Indians were gobsmacked, and gradually many things happened. Lines snaked around the ATM’s, few political parties…
Continue

Added by CISO Platform on November 29, 2019 at 2:08pm — No Comments

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

  • Equifax hack needs no introduction. One third of American lost their social security number due to this single breach. Here’s some of the top mistakes/learning from Equifax breach from my perspective. I would invite all of you to also add your comments and thoughts.

 

1. Patch on time (Yawn ..)

  • Most of the breaches happen not because…
Continue

Added by CISO Platform on November 29, 2019 at 2:00pm — No Comments

Top 5 Vulnerability Assessment Vendors for Q1 2017

  • Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. This article provides you a list of popular Vulnerability assessment vendors for Q1 2017.

 

  • Here are the top 5 Vulnerability assessment vendors…
Continue

Added by CISO Platform on November 29, 2019 at 2:00pm — No Comments

India Security Buying Priority Report (2017) & FireCompass Top Products & Popular Comparisons

India Security Buying Priority Report (2017) & FireCompass Top Viewed Products, Popular Comparisons

 

  • We are happy to announce the results of the annual survey of Security Buying Priority in which 350+ Companies have participated in the enterprise segment. This is a study of the key findings on the buying of various security technologies. Also, in this study you will get to know FireCompass Top Viewed Products, Top Rated Products & Top Comparisons…
Continue

Added by CISO Platform on November 29, 2019 at 2:00pm — No Comments

Top 5 Privileged Access Management (PAM) Vendors for Q1 2017

  • A privileged access management technology needs to accommodate for the special needs…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best Encryption Softwares for Q1 2017

  • Encryption is a process of protecting your sensitive data by converting it into encoded information which could be read only with a key. Endpoint Encryption ensures data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. This article provides you a list of Best Encryption Softwares for Q1 2017.

 

  • Here are the Top 5  Encryption Vendors to watch out…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best DDoS Tools (Distributed Denial of Service) for Q1 2017

  • Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

Top 5 Managed Security Service Provider (MSSP) for Q1 2017

  • Security services of a network are often outsourced to an outside or third party service provider. Such an outsourced security service is called Managed Security Services (MSS) and the service provider provider is called Managed Security Service Provider (MSSP). This article provides you a list of top 5 Managed Security Service Provider (MSSP) for Q1 2017.

 

  • Here are the top 5 Managed Security Service Provider (MSSP) to watch out…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service