CISO Platform's Blog – December 2014 Archive (10)

A Sprint To Protect Point-of-Sale

(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)

A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities

From Target to…

Continue

Added by CISO Platform on December 23, 2014 at 6:30pm — No Comments

The Notorious 9 in Cloud Security

(Read More: Top 6 'Cloud Security' talks from RSA Conference 2016 (USA))

The Notorious 9 in Cloud…

Continue

Added by CISO Platform on December 23, 2014 at 6:00pm — No Comments

How the Heartbleed bug was found by Antti Karjalainen - discoverer of Heartbleed

(Read more:  APT Secrets that Vendors Don't Tell)

The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk at CISO Platform Annual Summit, will give background how the…

Continue

Added by CISO Platform on December 22, 2014 at 8:00pm — No Comments

Bitcoin Transaction Malleability: An Insight

Bitcoin Transaction Malleability, an Insight by Daniel Chechik.The bitcoin network vulnerability had disturbed the huge bitcoin network. Plenty trading websites like Silk Road,MTGox and more have been victim to "Bitcoin Transaction Malleability." This talk will take you through the vulnerability and how exactly it may be exploited.…



Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

Cyber Safety in Cars and Medical Devices

Cyber Safety in Cars and Medical Devices by Beau Woods, creator of IOT Security Framework. We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life and safety systems, bits and bytes meet flesh and bone. We must know, not just hope, that devices with the ability to impact human life and public safety are worthy of our trust. Learn how the safety impacts of merging cyber security with cars and…

Continue

Added by CISO Platform on December 19, 2014 at 2:30am — No Comments

More Shadow Walker The Progression of TLB Splitting On X86 Jacob Torrey

This talk will cover the concept of mis-using the hardware (x86 translation lookaside buffer) to provide code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-splitting on modern hardware. After requisite background is provided, the talk will then move to the new research, the author's method for splitting a TLB on Core i-series and newer processors and how it can again be used for defensive (MoRE…

Continue

Added by CISO Platform on December 19, 2014 at 2:00am — No Comments

6 Key Principals for creating a Secure Cloud

Securing a cloud environment requires, and offers a new approach to security: holistic Security Intelligence. Many organizations have dozens of different point products to address security concerns. For example, they may have a firewall from one vendor, identity management from another, and application scanning from a third. This creates a siloed approach to security. However, as attacks become both more complex and sophisticated, it has become a priority to look across all of these…

Continue

Added by CISO Platform on December 4, 2014 at 3:30pm — No Comments

5 Key Benefits of Source Code Analysis

Static Code Analysis: Binary vs. Source

Static Code Analysis is the technique of automatically analyzing the application’s source and binary code to find security vulnerabilities. According to Gartner’s 2011 Magic Quadrant for Static Application Security Testing (SAST), “SAST should be…

Continue

Added by CISO Platform on December 2, 2014 at 7:00pm — No Comments

Source Code Analysis- How to Remediate your Vulnerabilities

The AppSec How -To:Visualizing and Effectively Remediating Your Vulnerabilities: The biggest challenge when working with Source Code Analysis (SCA) tools is how to effectively prioritize and fix the numerous results. Developers are quickly overwhelmed trying to analyze security reports containing results that…

Continue

Added by CISO Platform on December 2, 2014 at 4:00pm — No Comments

10 Steps to Secure Agile Development

In Agile’s fast-paced environment and frequent releases,security reviews and testing sound like an impediment to success. How can you keep up with Agile demands of continuous integration and continuous deployment without abandoning security best practices? 

Companies have found the following ten practices helpful to achieve a holistic secure…

Continue

Added by CISO Platform on December 1, 2014 at 4:30pm — No Comments

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

Related Posts