Social Network For Security Executives: Help Make Right Cyber Security Decisions
Added by CISO Platform on July 13, 2017 at 5:00pm — No Comments
Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.
Agenda Highlights: SACON 2017 aims to…Continue
Added by CISO Platform on July 7, 2017 at 5:30pm — No Comments
The document is intended to be a guide for organizations faced with a ransomware infection. This guide is split into several sections, with the most critical and time-sensitive being in the initial response section.
If you are currently experiencing a ransomware incident, it is highly recommended you immediately review the containment section below, and return to this section at a later time for an overall background of ransomware.…Continue
Added by CISO Platform on May 16, 2017 at 6:30pm — No Comments
This report gives you a broad view on the present technology providers and their relative position. The Magic Quadrant report positions technology players within a specific market. It brings together the major competing technology providers along with emerging, established and niche technology providers.
The evaluation criteria along with graphical representation help ones rapidly ascertain the technology providers and their performance in the…Continue
Added by CISO Platform on May 2, 2017 at 11:00pm — No Comments
Root cause analysis/investigation/forensic analysis of crisis, acquisition and retention of evidence and logs are necessary from legal point of view. Collection of evidence needs to be efficient so that the bank should not face any legal complexity during further investigation. The below guidelines need to be followed to avoid legal complexity.
Top 7 Things to do:
Added by CISO Platform on April 29, 2017 at 10:40pm — No Comments
There are four phases in Cyber Crisis Management, namely Detection, Response, Containment &amp; Recovery. Here is a glimpse of the four phases.
Added by CISO Platform on April 29, 2017 at 10:00pm — No Comments
Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass
Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments
This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…
Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments
The 2016 trends in cybersecurity report talks about the top 10 trends and stats that matter most to security and enterprise leaders. Its imperative to stay on top of security concerns in today's changing world.
What's in the Report?
Added by CISO Platform on December 28, 2016 at 1:30pm — No Comments
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully…Continue
Added by CISO Platform on January 27, 2016 at 2:00pm — No Comments
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception has begun to have a dramatic impact on the…Continue
Added by CISO Platform on December 4, 2015 at 11:30am — No Comments
Why Read This Report
In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them to determine which are best able to protect their customers’ business. The DDoS services space is growing in importance because distributed denial of service attacks now…Continue
Added by CISO Platform on October 30, 2015 at 3:30pm — No Comments
Effectively combating cybercriminals requires understanding how they operate. How do they render endpoint protection solutions inoperable? What methods do they use to sidestep two- factor authentication? How do they trick device ID systems and behavioral analytic and risk engines into believing their transactions are legitimate?
This white paper…Continue
Added by CISO Platform on October 30, 2015 at 3:00pm — No Comments
This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the data center to the cloud.
Why Read the Buyer's Guide?
To help you evaluate whether an IAM solution effectively supports your short- and long- term objectives, this guide…Continue
Added by CISO Platform on October 9, 2015 at 11:00pm — No Comments
IBM Managed Security Services continuously monitors billions of events per year, as reported by more than 8,000 client devices in over 100 countries. This report is based on data IBM collected between 1 January 2014 and 31 December 2014 in the course of monitoring client security devices as well as data derived from responding to…Continue
Added by CISO Platform on September 9, 2015 at 4:30pm — No Comments
This year’s study examines the costs incurred by 36 Indian companies in 12 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims and/or regulators as required by laws and business…Continue
Added by CISO Platform on August 20, 2015 at 10:30pm — No Comments
CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber Security Professionals
New Delhi, Bangalore, India, June 4, 2015: CISO Platform, an online community for senior IT Security Professionals announces the official launch of its comprehensive…Continue
Added by CISO Platform on June 6, 2015 at 11:30am — No Comments
Gaana.com, one of the popular music streaming service got hacked. It is reported that 10 million username, email addresses, MD5-encrypted password, date of births, and other personal information has been stolen.
It is reported by their CEO that they have taken the adequate measures to safeguard post incident. Here are a…Continue
Added by CISO Platform on May 29, 2015 at 2:30pm — No Comments
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services enmasse. Bring Your Own Device (BYOD) was born and employees followed with fervor.
Forrester’s study of US information workers revealed that 37%…Continue
Added by CISO Platform on May 12, 2015 at 3:00pm — No Comments
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services,…Continue
Added by CISO Platform on May 5, 2015 at 5:30pm — No Comments