CISO Platform's Blog (125)

Hottest Buzzword Trend Analysis from RSA Conference 2015- San Francisco

RSA expo floor is the madness that we love. The fringes are more interesting to me than the center. If you want to spot the new go to the fringes. We tried to have a bit of fun this year by analyzing the buzzwords as seen in the expo floor.

How we did the analysis?

We took hundreds of pics of booths all around the expo floor and tried to do the keyword analysis and find out the most prominent buzz words. We tried to give importance to relative size of the…

Continue

Added by CISO Platform on April 28, 2015 at 1:00am — No Comments

Key Learning from Amit Yoran's keynote @ RSA Conference 2015

I am on my way back from RSA Conference 2015 @ San Francisco. It is a cloudy day at New York. Perfect day to write a quick blog. Here's my interpretation of Amit Yoran's talk with a bit of my thoughts poured into it.

Taller walls won't solve the problem. We need fundamentally different approach which is not discovered yet.

We need fundamental shifts in computer science research to be more effective in building better…

Continue

Added by CISO Platform on April 28, 2015 at 12:00am — No Comments

Intelligence Driven Security - SIEM & Beyond

Watch Video: (Webinar) Intelligence Driven Security - SIEM & Beyond

( Read more:  Checklist to Evaluate a DLP Provider )

What will you…

Continue

Added by CISO Platform on March 16, 2015 at 11:30am — No Comments

Pre-launch Preview: State of Security Technology Adoption in Enterprises - Annual Report 2015

We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking, in which 410 companies have participated in the enterprise segment. This is a preview of the key findings on the implementation of various security technologies.

The data has been collected through the survey conducted online through the "5th Top 100 CISO Awards,…

Continue

Added by CISO Platform on March 12, 2015 at 5:30pm — No Comments

How to Embed Risk Assessment into your Project Workstream

(Read more: Checklist to Evaluate IT Project Vendors)

How to Embed Risk Assessment into your Project Workstream by Michael Calderin - Security Officer, Bupa Global Latin America

Position…

Continue

Added by CISO Platform on January 9, 2015 at 5:30pm — No Comments

A Sprint To Protect Point-of-Sale

(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)

A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities

From Target to…

Continue

Added by CISO Platform on December 23, 2014 at 6:30pm — No Comments

The Notorious 9 in Cloud Security

(Read More: Top 6 'Cloud Security' talks from RSA Conference 2016 (USA))

The Notorious 9 in Cloud…

Continue

Added by CISO Platform on December 23, 2014 at 6:00pm — No Comments

How the Heartbleed bug was found by Antti Karjalainen - discoverer of Heartbleed

(Read more:  APT Secrets that Vendors Don't Tell)

The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk at CISO Platform Annual Summit, will give background how the…

Continue

Added by CISO Platform on December 22, 2014 at 8:00pm — No Comments

Bitcoin Transaction Malleability: An Insight

Bitcoin Transaction Malleability, an Insight by Daniel Chechik.The bitcoin network vulnerability had disturbed the huge bitcoin network. Plenty trading websites like Silk Road,MTGox and more have been victim to "Bitcoin Transaction Malleability." This talk will take you through the vulnerability and how exactly it may be exploited.…



Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

Cyber Safety in Cars and Medical Devices

Cyber Safety in Cars and Medical Devices by Beau Woods, creator of IOT Security Framework. We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life and safety systems, bits and bytes meet flesh and bone. We must know, not just hope, that devices with the ability to impact human life and public safety are worthy of our trust. Learn how the safety impacts of merging cyber security with cars and…

Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

More Shadow Walker The Progression of TLB Splitting On X86 Jacob Torrey

This talk will cover the concept of mis-using the hardware (x86 translation lookaside buffer) to provide code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware. After requisite background is provided, the talk will then move to the new research, the author's method for splitting a TLB on Core i-series and newer processors and how it can again be used for defensive (MoRE…

Continue

Added by CISO Platform on December 19, 2014 at 2:00am — No Comments

6 Key Principals for creating a Secure Cloud

Securing a cloud environment requires, and offers a new approach to security: holistic Security Intelligence. Many organizations have dozens of different point products to address security concerns. For example, they may have a firewall from one vendor, identity management from another, and application scanning from a third. This creates a siloed approach to security. However, as attacks become both more complex and sophisticated, it has become a priority to look across all of these…

Continue

Added by CISO Platform on December 4, 2014 at 3:30pm — No Comments

5 Key Benefits of Source Code Analysis

Static Code Analysis: Binary vs. Source

Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. According to Gartner’s 2011 Magic Quadrant for Static Application Security Testing (SAST), “SAST should be…

Continue

Added by CISO Platform on December 2, 2014 at 7:00pm — No Comments

Source Code Analysis- How to Remediate your Vulnerabilities

The AppSec How -To:Visualizing and Effectively Remediating Your Vulnerabilities: The biggest challenge when working with Source Code Analysis (SCA) tools is how to effectively prioritize and fix the numerous results. Developers are quickly overwhelmed trying to analyze security reports containing results that…

Continue

Added by CISO Platform on December 2, 2014 at 4:00pm — No Comments

10 Steps to Secure Agile Development

In Agile’s fast-paced environment and frequent releases,security reviews and testing sound like an impediment to success. How can you keep up with Agile demands of continuous integration and continuous deployment without abandoning security best practices? 

Companies have found the following ten practices helpful to achieve a holistic secure…

Continue

Added by CISO Platform on December 1, 2014 at 4:30pm — No Comments

Your Guide to Multi-Layered Web Security

Why Read This Report

The data center perimeter is dead. But its memory lives on in the way many IT departments continue to secure their infrastructure. The meteoric rise of the Internet brought with it an ever-changing landscape of new attacks and completely disrupted organizations’ old models of guarding their IT infrastructure. Previously, information assets that needed protection all resided in a fortress…

Continue

Added by CISO Platform on November 18, 2014 at 10:30pm — 1 Comment

Launching Community based "Common Framework for Security Technology Evaluation" @ Annual Summit,2014

Why do we need a common security technology evaluation framework? 

Floating an RFP (Request for Proposal)  or evaluating a new technology for a CISO is a substantial effort. Going through the sea of data  and marketing buzz to judge a vendor and its product is…

Continue

Added by CISO Platform on September 3, 2014 at 9:30pm — No Comments

Bypass Firewalls, Application White Lists, Secure Remote Desktops in 20sec

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:30am — No Comments

Detecting & Defending Against State-Actor Surveillance

(Source: Defcon 22-Las Vegas)

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Check your Fingerprints: Cloning the Strong Set

Added by CISO Platform on August 14, 2014 at 3:00am — No Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service