Social Network For Senior Security Executives
The 2016 trends in cybersecurity report talks about the top 10 trends and stats that matter most to security and enterprise leaders. Its imperative to stay on top of security concerns in today's changing world.
What's in the Report?
Added by CISO Platform on December 28, 2016 at 1:30pm — No Comments
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully…Continue
Added by CISO Platform on January 27, 2016 at 2:00pm — No Comments
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception has begun to have a dramatic impact on the…Continue
Added by CISO Platform on December 4, 2015 at 11:30am — No Comments
Why Read This Report
In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them to determine which are best able to protect their customers’ business. The DDoS services space is growing in importance because distributed denial of service attacks now…Continue
Added by CISO Platform on October 30, 2015 at 3:30pm — No Comments
Effectively combating cybercriminals requires understanding how they operate. How do they render endpoint protection solutions inoperable? What methods do they use to sidestep two- factor authentication? How do they trick device ID systems and behavioral analytic and risk engines into believing their transactions are legitimate?
This white paper…Continue
Added by CISO Platform on October 30, 2015 at 3:00pm — No Comments
This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the data center to the cloud.
Why Read the Buyer's Guide?
To help you evaluate whether an IAM solution effectively supports your short- and long- term objectives, this guide…Continue
Added by CISO Platform on October 9, 2015 at 11:00pm — No Comments
IBM Managed Security Services continuously monitors billions of events per year, as reported by more than 8,000 client devices in over 100 countries. This report is based on data IBM collected between 1 January 2014 and 31 December 2014 in the course of monitoring client security devices as well as data derived from responding to…Continue
Added by CISO Platform on September 9, 2015 at 4:30pm — No Comments
This year’s study examines the costs incurred by 36 Indian companies in 12 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims and/or regulators as required by laws and business…Continue
Added by CISO Platform on August 20, 2015 at 10:30pm — No Comments
CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber Security Professionals
New Delhi, Bangalore, India, June 4, 2015: CISO Platform, an online community for senior IT Security Professionals announces the official launch of its comprehensive…Continue
Added by CISO Platform on June 6, 2015 at 11:30am — No Comments
Gaana.com, one of the popular music streaming service got hacked. It is reported that 10 million username, email addresses, MD5-encrypted password, date of births, and other personal information has been stolen.
It is reported by their CEO that they have taken the adequate measures to safeguard post incident. Here are a…Continue
Added by CISO Platform on May 29, 2015 at 2:30pm — No Comments
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services enmasse. Bring Your Own Device (BYOD) was born and employees followed with fervor.
Forrester’s study of US information workers revealed that 37%…Continue
Added by CISO Platform on May 12, 2015 at 3:00pm — No Comments
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services,…Continue
Added by CISO Platform on May 5, 2015 at 5:30pm — No Comments
RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.
How we did the analysis?
We took hundreds of pics of booths all around the expo floor and tried to do the keyword analysis and find out the most prominent buzz words. We tried to give importance to relative size of the…Continue
Added by CISO Platform on April 28, 2015 at 1:00am — No Comments
I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.
Taller walls won't solve the problem. We need fundamentally different approach which is not discovered yet.
We need fundamental shifts in computer science research to be more effective in building better…Continue
Added by CISO Platform on April 28, 2015 at 12:00am — No Comments
( Read more: Checklist to Evaluate a DLP Provider )
What will you…Continue
Added by CISO Platform on March 16, 2015 at 11:30am — No Comments
We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking, in which 410 companies have participated in the enterprise segment. This is a preview of the key findings on the implementation of various security technologies.
The data has been collected through the survey conducted online through the "5th Top 100 CISO Awards,…Continue
Added by CISO Platform on March 12, 2015 at 5:30pm — No Comments
(Read more: Checklist to Evaluate IT Project Vendors)
How to Embed Risk Assessment into your Project Workstream by Michael Calderin - Security Officer, Bupa Global Latin America
Added by CISO Platform on January 9, 2015 at 5:30pm — No Comments
(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)
A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities
From Target to…Continue
Added by CISO Platform on December 23, 2014 at 6:30pm — No Comments
The Notorious 9 in Cloud…Continue
Added by CISO Platform on December 23, 2014 at 6:00pm — No Comments
(Read more: APT Secrets that Vendors Don't Tell)
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk at CISO Platform Annual Summit, will give background how the…Continue
Added by CISO Platform on December 22, 2014 at 8:00pm — No Comments