CISO Platform's Blog (117)

2016 Summary Report: Top 10 Trends in Exploits & Security Intelligence

The 2016 trends in cybersecurity report talks about the top 10 trends and stats that matter most to security and enterprise leaders. Its imperative to stay on top of security concerns in today's changing world.

What's in the Report? 

  • Study & Analysis of Exploits, 6000+ Vulnerabilities disclosed in 2016…
Continue

Added by CISO Platform on December 28, 2016 at 1:30pm — No Comments

IDC Report: CISOs' Guide to Enabling a Cloud Security Strategy

For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully…

Continue

Added by CISO Platform on January 27, 2016 at 2:00pm — No Comments

Top 8 CyberSecurity Predictions for 2016

Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception has begun to have a dramatic impact on the…

Continue

Added by CISO Platform on December 4, 2015 at 11:30am — No Comments

The Forrester Wave: DDoS Guide, Q3 2015

Why Read This Report

In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them to determine which are best able to protect their customers’ business. The DDoS services space is growing in importance because distributed denial of service attacks now…

Continue

Added by CISO Platform on October 30, 2015 at 3:30pm — No Comments

Battling Fraud: How cybercriminals bypass your security defenses?

Effectively combating cybercriminals requires understanding how they operate. How do they render endpoint protection solutions inoperable? What methods do they use to sidestep two- factor authentication? How do they trick device ID systems and behavioral analytic and risk engines into believing their transactions are legitimate?

This white paper…

Continue

Added by CISO Platform on October 30, 2015 at 3:00pm — No Comments

Buyers Guide for Identity & Access Governance

This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the data center to the cloud.

Why Read the Buyer's Guide? 

To help you evaluate whether an IAM solution effectively supports your short- and long- term objectives, this guide…

Continue

Added by CISO Platform on October 9, 2015 at 11:00pm — No Comments

Analysis Report: Cyber Attack & Incident Data, 2015

IBM Managed Security Services continuously monitors billions of events per year, as reported by more than 8,000 client devices in over 100 countries. This report is based on data IBM collected between 1 January 2014 and 31 December 2014 in the course of monitoring client security devices as well as data derived from responding to…

Continue

Added by CISO Platform on September 9, 2015 at 4:30pm — No Comments

Ponemon Report: Cost of Data Breach in India, 2015

This year’s study examines the costs incurred by 36 Indian companies in 12 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims and/or regulators as required by laws and business…

Continue

Added by CISO Platform on August 20, 2015 at 10:30pm — No Comments

Comprehensive Salary Guide For Cyber Security Professionals: First Time Ever In India

CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber Security Professionals

New Delhi, Bangalore, India, June 4, 2015: CISO Platform, an online community for senior IT Security Professionals announces the official launch of its comprehensive…

Continue

Added by CISO Platform on June 6, 2015 at 11:30am — No Comments

Gaana.com hacked. 10 Million users affected. What should you do?

Gaana.com, one of the  popular music streaming service got hacked. It is reported that 10 million username, email addresses, MD5-encrypted password, date of births, and other personal information has been stolen. 

It is reported by their CEO that they have taken the adequate measures to safeguard post incident. Here are a…

Continue

Added by CISO Platform on May 29, 2015 at 2:30pm — No Comments

The 10 Commandments of BYOD

The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services enmasse. Bring Your Own Device (BYOD) was born and employees followed with fervor.

Forrester’s study of US information workers revealed that 37%…

Continue

Added by CISO Platform on May 12, 2015 at 3:00pm — No Comments

How to Combat Malware-Driven Financial Fraud

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services,…

Continue

Added by CISO Platform on May 5, 2015 at 5:30pm — No Comments

Hottest Buzzword Trend Analysis from RSA Conference 2015- San Francisco

RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.

How we did the analysis?

We took hundreds of pics of booths all around the expo floor and tried to do the keyword analysis and find out the most prominent buzz words. We tried to give importance to relative size of the…

Continue

Added by CISO Platform on April 28, 2015 at 1:00am — No Comments

Key Learning from Amit Yoran's keynote @ RSA Conference 2015

I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.

Taller walls won't solve the problem. We need fundamentally different approach which is not discovered yet.

We need fundamental shifts in computer science research to be more effective in building better…

Continue

Added by CISO Platform on April 28, 2015 at 12:00am — No Comments

Intelligence Driven Security - SIEM & Beyond

Watch Video: (Webinar) Intelligence Driven Security - SIEM & Beyond

( Read more:  Checklist to Evaluate a DLP Provider )

What will you…

Continue

Added by CISO Platform on March 16, 2015 at 11:30am — No Comments

Pre-launch Preview: State of Security Technology Adoption in Enterprises - Annual Report 2015

We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking, in which 410 companies have participated in the enterprise segment. This is a preview of the key findings on the implementation of various security technologies.

The data has been collected through the survey conducted online through the "5th Top 100 CISO Awards,…

Continue

Added by CISO Platform on March 12, 2015 at 5:30pm — No Comments

How to Embed Risk Assessment into your Project Workstream

(Read more: Checklist to Evaluate IT Project Vendors)

How to Embed Risk Assessment into your Project Workstream by Michael Calderin - Security Officer, Bupa Global Latin America

Position…

Continue

Added by CISO Platform on January 9, 2015 at 5:30pm — No Comments

A Sprint To Protect Point-of-Sale

(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)

A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities

From Target to…

Continue

Added by CISO Platform on December 23, 2014 at 6:30pm — No Comments

The Notorious 9 in Cloud Security

(Read More: Top 6 'Cloud Security' talks from RSA Conference 2016 (USA))

The Notorious 9 in Cloud…

Continue

Added by CISO Platform on December 23, 2014 at 6:00pm — No Comments

How the Heartbleed bug was found by Antti Karjalainen - discoverer of Heartbleed

(Read more:  APT Secrets that Vendors Don't Tell)

The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk at CISO Platform Annual Summit, will give background how the…

Continue

Added by CISO Platform on December 22, 2014 at 8:00pm — No Comments

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts