CISO Platform's Blog (119)

Top 5 Enterprise Security Architecture Measurement Categories

Here is brief Summary of Top 5 Enterprise Security Architecture Measurement Categories. This was earlier presented in SACON (India's only Security Architecture Conference in India)by Arnab Chattopadhyay, VP - Engineering @ Infoworks Inc & Bikash Barai, Co-Founder FireCompass

Architecture Measurement…


Added by CISO Platform on April 29, 2017 at 9:30pm — No Comments

Executive Summary to Build Enterprise Security Architecture Governance Program

This article examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the same can be applied to security architecture governance to build an overarching security environment that is easy to understand, change, monitor and maintain. This report was…


Added by CISO Platform on April 29, 2017 at 9:00pm — No Comments

2016 Summary Report: Top 10 Trends in Exploits & Security Intelligence

The 2016 trends in cybersecurity report talks about the top 10 trends and stats that matter most to security and enterprise leaders. Its imperative to stay on top of security concerns in today's changing world.

What's in the Report? 

  • Study & Analysis of Exploits, 6000+ Vulnerabilities disclosed in 2016…

Added by CISO Platform on December 28, 2016 at 1:30pm — No Comments

IDC Report: CISOs' Guide to Enabling a Cloud Security Strategy

For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationalize security across the datacenter and into the cloud architecture, fully…


Added by CISO Platform on January 27, 2016 at 2:00pm — No Comments

Top 8 CyberSecurity Predictions for 2016

Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception has begun to have a dramatic impact on the…


Added by CISO Platform on December 4, 2015 at 11:30am — No Comments

The Forrester Wave: DDoS Guide, Q3 2015

Why Read This Report

In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them to determine which are best able to protect their customers’ business. The DDoS services space is growing in importance because distributed denial of service attacks now…


Added by CISO Platform on October 30, 2015 at 3:30pm — No Comments

Battling Fraud: How cybercriminals bypass your security defenses?

Effectively combating cybercriminals requires understanding how they operate. How do they render endpoint protection solutions inoperable? What methods do they use to sidestep two- factor authentication? How do they trick device ID systems and behavioral analytic and risk engines into believing their transactions are legitimate?

This white paper…


Added by CISO Platform on October 30, 2015 at 3:00pm — No Comments

Buyers Guide for Identity & Access Governance

This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the data center to the cloud.

Why Read the Buyer's Guide? 

To help you evaluate whether an IAM solution effectively supports your short- and long- term objectives, this guide…


Added by CISO Platform on October 9, 2015 at 11:00pm — No Comments

Analysis Report: Cyber Attack & Incident Data, 2015

IBM Managed Security Services continuously monitors billions of events per year, as reported by more than 8,000 client devices in over 100 countries. This report is based on data IBM collected between 1 January 2014 and 31 December 2014 in the course of monitoring client security devices as well as data derived from responding to…


Added by CISO Platform on September 9, 2015 at 4:30pm — No Comments

Ponemon Report: Cost of Data Breach in India, 2015

This year’s study examines the costs incurred by 36 Indian companies in 12 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims and/or regulators as required by laws and business…


Added by CISO Platform on August 20, 2015 at 10:30pm — No Comments

Comprehensive Salary Guide For Cyber Security Professionals: First Time Ever In India

CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber Security Professionals

New Delhi, Bangalore, India, June 4, 2015: CISO Platform, an online community for senior IT Security Professionals announces the official launch of its comprehensive…


Added by CISO Platform on June 6, 2015 at 11:30am — No Comments hacked. 10 Million users affected. What should you do?, one of the  popular music streaming service got hacked. It is reported that 10 million username, email addresses, MD5-encrypted password, date of births, and other personal information has been stolen. 

It is reported by their CEO that they have taken the adequate measures to safeguard post incident. Here are a…


Added by CISO Platform on May 29, 2015 at 2:30pm — No Comments

The 10 Commandments of BYOD

The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and connect them to corporate services enmasse. Bring Your Own Device (BYOD) was born and employees followed with fervor.

Forrester’s study of US information workers revealed that 37%…


Added by CISO Platform on May 12, 2015 at 3:00pm — No Comments

How to Combat Malware-Driven Financial Fraud

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services,…


Added by CISO Platform on May 5, 2015 at 5:30pm — No Comments

Hottest Buzzword Trend Analysis from RSA Conference 2015- San Francisco

RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.

How we did the analysis?

We took hundreds of pics of booths all around the expo floor and tried to do the keyword analysis and find out the most prominent buzz words. We tried to give importance to relative size of the…


Added by CISO Platform on April 28, 2015 at 1:00am — No Comments

Key Learning from Amit Yoran's keynote @ RSA Conference 2015

I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.

Taller walls won't solve the problem. We need fundamentally different approach which is not discovered yet.

We need fundamental shifts in computer science research to be more effective in building better…


Added by CISO Platform on April 28, 2015 at 12:00am — No Comments

Intelligence Driven Security - SIEM & Beyond

Watch Video: (Webinar) Intelligence Driven Security - SIEM & Beyond

( Read more:  Checklist to Evaluate a DLP Provider )

What will you…


Added by CISO Platform on March 16, 2015 at 11:30am — No Comments

Pre-launch Preview: State of Security Technology Adoption in Enterprises - Annual Report 2015

We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking, in which 410 companies have participated in the enterprise segment. This is a preview of the key findings on the implementation of various security technologies.

The data has been collected through the survey conducted online through the "5th Top 100 CISO Awards,…


Added by CISO Platform on March 12, 2015 at 5:30pm — No Comments

How to Embed Risk Assessment into your Project Workstream

(Read more: Checklist to Evaluate IT Project Vendors)

How to Embed Risk Assessment into your Project Workstream by Michael Calderin - Security Officer, Bupa Global Latin America



Added by CISO Platform on January 9, 2015 at 5:30pm — No Comments

A Sprint To Protect Point-of-Sale

(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)

A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities

From Target to…


Added by CISO Platform on December 23, 2014 at 6:30pm — No Comments

Monthly Archives









© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service