CISO Platform's Blog (125)

Launching Top Security Vendor Awards - Solely Based On User Reviews on FireCompass

Today buying has become more social & buyers want to know what their peers or what other buyers & users are saying about it. FireCompass thinks it is indeed a very great achievement when your buyers love your product and we want to help you spread that…
Continue

Added by CISO Platform on July 13, 2017 at 5:00pm — No Comments

Announcing Pre-Registrations@ SACON 2017: Security Architecture Conference

Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.

Agenda Highlights: SACON 2017 aims to…

Continue

Added by CISO Platform on July 7, 2017 at 5:30pm — No Comments

Ransomware Response Guide

The document is intended to be a guide for organizations faced with a ransomware infection. This guide is split into several sections, with the most critical and time-sensitive being in the initial response section. 

If you are currently experiencing a ransomware incident, it is highly recommended you immediately review the containment section below, and return to this section at a later time for an overall background of ransomware.…

Continue

Added by CISO Platform on May 16, 2017 at 6:30pm — No Comments

Gartner Magic Quadrant for Security Information and Event Management

This report gives you a broad view on the present technology providers and their relative position. The Magic Quadrant report positions technology players within a specific market. It brings together the major competing technology providers along with emerging, established and niche technology providers. 

The evaluation criteria along with graphical representation help ones rapidly ascertain the technology providers and their performance in the…

Continue

Added by CISO Platform on May 2, 2017 at 11:00pm — No Comments

Top 7 Things to do: Legal Aspects in Cyber Crisis Management (for Banks)

Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity during further investigation. The below guidelines need to be followed to avoid legal complexity.

Top 7 Things to do:

  • Affected every electronic evidence will be…
Continue

Added by CISO Platform on April 29, 2017 at 10:40pm — No Comments

4 Phases of Cyber Crisis Management

There are four phases in Cyber Crisis Management, namely Detection, Response, Containment & Recovery. Here is a glimpse of the four phases.

 …

Continue

Added by CISO Platform on April 29, 2017 at 10:00pm — No Comments

Top 5 Enterprise Security Architecture Measurement Categories

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass

Architecture Measurement…

Continue

Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments

Executive Summary to Build Enterprise Security Architecture Governance Program

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…

Continue

Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments

2016 Summary Report: Top 10 Trends in Exploits & Security Intelligence

The 2016 trends in cybersecurity report talks about the top 10 trends and stats that matter most to security and enterprise leaders. Its imperative to stay on top of security concerns in today's changing world.

What's in the Report? 

  • Study & Analysis of Exploits, 6000+ Vulnerabilities disclosed in 2016…
Continue

Added by CISO Platform on December 28, 2016 at 1:30pm — No Comments

IDC Report: CISOs' Guide to Enabling a Cloud Security Strategy

For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully…

Continue

Added by CISO Platform on January 27, 2016 at 2:00pm — No Comments

Top 8 CyberSecurity Predictions for 2016

Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception has begun to have a dramatic impact on the…

Continue

Added by CISO Platform on December 4, 2015 at 11:30am — No Comments

The Forrester Wave: DDoS Guide, Q3 2015

Why Read This Report

In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them to determine which are best able to protect their customers’ business. The DDoS services space is growing in importance because distributed denial of service attacks now…

Continue

Added by CISO Platform on October 30, 2015 at 3:30pm — No Comments

Battling Fraud: How cybercriminals bypass your security defenses?

Effectively combating cybercriminals requires understanding how they operate. How do they render endpoint protection solutions inoperable? What methods do they use to sidestep two- factor authentication? How do they trick device ID systems and behavioral analytic and risk engines into believing their transactions are legitimate?

This white paper…

Continue

Added by CISO Platform on October 30, 2015 at 3:00pm — No Comments

Buyers Guide for Identity & Access Governance

This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the data center to the cloud.

Why Read the Buyer's Guide? 

To help you evaluate whether an IAM solution effectively supports your short- and long- term objectives, this guide…

Continue

Added by CISO Platform on October 9, 2015 at 11:00pm — No Comments

Analysis Report: Cyber Attack & Incident Data, 2015

IBM Managed Security Services continuously monitors billions of events per year, as reported by more than 8,000 client devices in over 100 countries. This report is based on data IBM collected between 1 January 2014 and 31 December 2014 in the course of monitoring client security devices as well as data derived from responding to…

Continue

Added by CISO Platform on September 9, 2015 at 4:30pm — No Comments

Ponemon Report: Cost of Data Breach in India, 2015

This year’s study examines the costs incurred by 36 Indian companies in 12 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims and/or regulators as required by laws and business…

Continue

Added by CISO Platform on August 20, 2015 at 10:30pm — No Comments

Comprehensive Salary Guide For Cyber Security Professionals: First Time Ever In India

CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber Security Professionals

New Delhi, Bangalore, India, June 4, 2015: CISO Platform, an online community for senior IT Security Professionals announces the official launch of its comprehensive…

Continue

Added by CISO Platform on June 6, 2015 at 11:30am — No Comments

Gaana.com hacked. 10 Million users affected. What should you do?

Gaana.com, one of the  popular music streaming service got hacked. It is reported that 10 million username, email addresses, MD5-encrypted password, date of births, and other personal information has been stolen. 

It is reported by their CEO that they have taken the adequate measures to safeguard post incident. Here are a…

Continue

Added by CISO Platform on May 29, 2015 at 2:30pm — No Comments

The 10 Commandments of BYOD

The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services enmasse. Bring Your Own Device (BYOD) was born and employees followed with fervor.

Forrester’s study of US information workers revealed that 37%…

Continue

Added by CISO Platform on May 12, 2015 at 3:00pm — No Comments

How to Combat Malware-Driven Financial Fraud

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services,…

Continue

Added by CISO Platform on May 5, 2015 at 5:30pm — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service