CISO Platform's Blog (173)

CISO Platform Annual Summit, 2020 Highlights

We wanted to share with you some of the amazing moments from “Annual Summit, India 2020” @ Bangalore on 21 & 22 Feb. We had over 700+ attendees including CISO and SACON attendees sharing knowledge through Taskforce Presentations, Panel Discussions Round Tables, Workshops and more making the conference a huge success.…

Continue

Added by CISO Platform on March 3, 2020 at 10:30am — No Comments

NATIONAL CYBER SECURITY STRATEGY 2020 (NCSS 2020)

Call for Comments

1. Need for NCSS 2020 India was one of the first few countries to propound a futuristic …
Continue

Added by CISO Platform on December 30, 2019 at 12:00pm — No Comments

Webinar-Under The Hood Of Deception Technologies

What will you learn:

  • How is deception technology different from honeypots ?
  • Deception v/s EDR, UEBA and NTA
  • A hacker’s view of deception across the kill-chain
  • Key technology capabilities or key components of deception technology

 

About Speaker:…

sahir-hidayatullah-ceo-smokescreen-.original

Continue

Added by CISO Platform on November 29, 2019 at 2:30pm — No Comments

Understanding Surface Web, Dark Web, Deep Web and Darknet

  • Well if you are a tech enthusiast, you must have come across these words just like I have a lot of times! But I had never looked so deeply into finding out the differences as I thought deep web and darknet are the same, but it’s not. So, let’s understand the difference between Surface Web, Deep Web, Dark Web and Darknet. Also understand what darknet browsers are needed to enter darkweb and darknet.

 

What is Surface Web?

  • Let me tell…
Continue

Added by CISO Platform on November 29, 2019 at 2:20pm — No Comments

Blokchain Drives Authentication and Cryptography to next Dimension

What is Blockchain?

  • Conventionally, we had a habit of maintaining everything in a centralized repository and safeguarding it by applying perimeter security. Blockchain is a current breakthrough technology which eliminates centralized concept and show cases the shared, distributed updated records of who is doing what. Although it is decentralized, it supports access rights and is secured by nature. Being immutable as one of its characteristics, it gives us more…
Continue

Added by CISO Platform on November 29, 2019 at 2:14pm — No Comments

“Digital Gold” – Here’s Everything ,You Should Know About BitCoins

  • Bitcoins are one of the most popular cryptocurrency which is growing rapidly for one of its unique feature where Nobody controls the transactions physically.

 

Prologue  

  • It was on November 8, 2016 when the Prime Minister Narendra Modi broke the news of Demonetization and billions of Indians were gobsmacked, and gradually many things happened. Lines snaked around the ATM’s, few political parties…
Continue

Added by CISO Platform on November 29, 2019 at 2:08pm — No Comments

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid

  • Equifax hack needs no introduction. One third of American lost their social security number due to this single breach. Here’s some of the top mistakes/learning from Equifax breach from my perspective. I would invite all of you to also add your comments and thoughts.

 

1. Patch on time (Yawn ..)

  • Most of the breaches happen not because…
Continue

Added by CISO Platform on November 29, 2019 at 2:00pm — No Comments

Top 5 Vulnerability Assessment Vendors for Q1 2017

  • Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. This article provides you a list of popular Vulnerability assessment vendors for Q1 2017.

 

  • Here are the top 5 Vulnerability assessment vendors…
Continue

Added by CISO Platform on November 29, 2019 at 2:00pm — No Comments

India Security Buying Priority Report (2017) & FireCompass Top Products & Popular Comparisons

India Security Buying Priority Report (2017) & FireCompass Top Viewed Products, Popular Comparisons

 

  • We are happy to announce the results of the annual survey of Security Buying Priority in which 350+ Companies have participated in the enterprise segment. This is a study of the key findings on the buying of various security technologies. Also, in this study you will get to know FireCompass Top Viewed Products, Top Rated Products & Top Comparisons…
Continue

Added by CISO Platform on November 29, 2019 at 2:00pm — No Comments

Top 5 Privileged Access Management (PAM) Vendors for Q1 2017

  • A privileged access management technology needs to accommodate for the special needs…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best Encryption Softwares for Q1 2017

  • Encryption is a process of protecting your sensitive data by converting it into encoded information which could be read only with a key. Endpoint Encryption ensures data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen. This article provides you a list of Best Encryption Softwares for Q1 2017.

 

  • Here are the Top 5  Encryption Vendors to watch out…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best DDoS Tools (Distributed Denial of Service) for Q1 2017

  • Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

Top 5 Managed Security Service Provider (MSSP) for Q1 2017

  • Security services of a network are often outsourced to an outside or third party service provider. Such an outsourced security service is called Managed Security Services (MSS) and the service provider provider is called Managed Security Service Provider (MSSP). This article provides you a list of top 5 Managed Security Service Provider (MSSP) for Q1 2017.

 

  • Here are the top 5 Managed Security Service Provider (MSSP) to watch out…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

Top 5 Unified Threat Management (UTM) Vendors for Q1 2017

  • Unified Threat Management (UTM) is an all in one security solution that integrates firewalls, anti-viruses, content filtering, spam filtering, VPN protection, anti-spyware and other security system you need to protect your network. It can perform many security functions simultaneously to provide layered protection to all sizes of organization. This article provides you a list of top 5 Unified Threat Management (UTM) Vendors for Q1 2017.

 

  • Here are the top 5…
Continue

Added by CISO Platform on November 29, 2019 at 1:30pm — No Comments

5 Best DDoS Tools (Distributed Denial of Service) for Q1 2017

  • Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for…
Continue

Added by CISO Platform on November 29, 2019 at 1:28pm — No Comments

Top 5 Emerging Vendors providing DNS Security

  • Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.

 

What is DNS (Domain Name System)?

  • DNS (Domain Name System) is the most important part of Internet. When entering any website’s address (e.g.…
Continue

Added by CISO Platform on November 29, 2019 at 1:20pm — No Comments

Top 5 Emerging Vendors providing DNS Security

  • Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.

 

What is DNS (Domain Name System)?

  • DNS (Domain Name System) is the most important part of Internet. When entering any website’s address (e.g.…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Network Advanced Threat Protection (ATP) Solutions for Q1 2017

Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Emerging Vulnerability Management Solutions for Q1 2017

  • Vulnerability Management Solutions helps to prioritize and remediate vulnerabilities by consolidating data from multiple vulnerability scanning tools (Network VA, DAST etc.). It correlate and help to prioritize the risk (some do this by…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Top 5 Threat Hunting tools for Q1 2017

Here is the list of top 5 vendors emerging Threat Hunting tools, but before that let us understand what threat hunting exactly refers to.

Threat Hunting?

  • Threat hunting is a proactive approach to identifying adversaries rather than reactively waiting for an alert to go off. This is an iterative process, meaning that it has to be continuously carried out in a loop, beginning with a hypothesis. It involves a security analyst who keeps an…
Continue

Added by CISO Platform on November 29, 2019 at 1:00pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service