CISO Platform's Blog (180)

Top Emerging Cyber Security Vendors To Look Out For In 2018

  • Looking for Top Emerging Companies in the Cyber Security Industry?  FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have missed some of the products. But still we gave our best to give you the top guns who are uniquely innovative in their area of expertise.
  • Lets have a look at 50 Emerging Cyber Security Vendors for year…
Continue

Added by CISO Platform on November 28, 2019 at 5:00pm — No Comments

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

What will you learn:

  • Overview of data leakages
    • Cases
    • Risks
    • Solutions
  • Protection against data leakages
    • Main challenges
    • Sources of data leakages
    • Tools and solutions
  • Data Leakage Prevention systems
    • Core principles and technologies involved
  • Layered insider threat…
Continue

Added by CISO Platform on November 28, 2019 at 4:30pm — No Comments

Benchmarking Web Application Firewall (WAF) Solutions

  • Today web applications are ubiquitous and in many cases, the primary source of engagement between the user and the organization. Traditionally, organizations relied on network security controls such as network firewalls and IDS/IPS as the primary defence mechanism even for applications, but that is a very flawed approach. Application security requires organizations to rethink their security strategy and not take a piecemeal view. There is a critical need for an evaluation…
Continue

Added by CISO Platform on November 28, 2019 at 4:00pm — No Comments

Benchmarking Deception Solutions

  • With the evolving threat landscape, breaches are becoming increasingly common. As per Ponemon Institute, in 2017, the average time required to detect a breach was 191 days and the average time required to contain a breach was 66 days. These time frames can have a significant impact on businesses relying on technology for their continued operations. Deception as a strategy has always been a critical element for detecting threats and adversary behavior. Honeypots have…
Continue

Added by CISO Platform on November 28, 2019 at 3:30pm — No Comments

Webinar- Mastering Next Gen SIEM Use Cases (Part3)

  • Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 3 of 3 series.

 

What will you learn:

  • Tools and techniques – understanding the taxonomy
  • Top use cases for the SOC
  • Attack surfaces
    • Insider…
Continue

Added by CISO Platform on November 28, 2019 at 3:30pm — No Comments

Top Endpoint Encryption Technology Vendors

  • Encryption Technology is a process of protecting your sensitive data by converting it into encoded information which could be read only with a key. Endpoint Encryption technology ensures data privacy by encrypting data stored on your endpoints—including PCs, Macintoshes, DVDs, and USB drives, which can easily be lost or stolen.
  • Here are Top Endpoint Encryption Technology Vendors:

 

https://www.firecompass.com/security/vendors/cylance

  • Endpoint…
Continue

Added by CISO Platform on November 28, 2019 at 3:30pm — No Comments

Cyber Security Blogs One Must Follow Today

  • The world of cyber security is moving so fast, that it is important to keep yourself updated with the newest technology. There are numerous articles, newsletters,reports etc claiming to provide authentic information, but which one to trust ?! Hence, we have come up with the list of some of the most influencing and up-to-date cyber security blogs which one must follow, irrespective of being either a new entrant or veteran in this industry.

    We know that these are not the only…
Continue

Added by CISO Platform on November 28, 2019 at 3:30pm — No Comments

Top Emerging Indian Cyber Security Vendors in 2018

  • We have completed our selection of the final list of Top Indian Cyber Security Vendors to look out for in 2018 from all the vendors nationwide. Believe me this was not easy & we don’t claim this is exhaustive list as it probably will never be. But still we gave our best to give you the top guns who are uniquely innovative.
  • Let’s have a look at the top Indian Cyber Security Vendors 

 …

Continue

Added by CISO Platform on November 28, 2019 at 3:00pm — No Comments

(Report)Top Learnings & Detailed Analysis From COSMOS Bank Breach

  • Recently, you might have heard in news about COSMOS Bank, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. The bank lost INR 940 million (94 Crores) due to this breach on 11th & 13th August.
  • As per reports, the fraudulent transactions were carried out on August 11 and August 13 and the malware attack by the hackers originated in Canada, Cosmos Bank chairman Milind Kale told. In the first attack on…
Continue

Added by CISO Platform on November 28, 2019 at 2:30pm — No Comments

The Biggest Data Breaches in 2018 so far

The year of 2017 has been already marked with many historic big and bad data breaches. Lets look at the major cyber security breaches in the 2018 so far:

Aadhaar

  • In January, correspondents with the Tribune News Service in India paid 500 rupees for login certifications to an administration being offered by mysterious venders over WhatsApp. Utilizing the administration, the correspondents could enter any Aadhaar number, a…
Continue

Added by CISO Platform on November 28, 2019 at 2:30pm — No Comments

Cyber Security Trends in 2018

  • Lets have a look at the Cyber security Trends as well as attacks in 2018 so far:
1.AI-powered attacks
  • In February, a study from teams at the University of Oxford and University of Cambridge warned that AI could be used as a tool to …
Continue

Added by CISO Platform on November 28, 2019 at 2:30pm — No Comments

Learn More About Managed Security Services (MSS)

Security services of a network are often outsourced to an outside or third party service provider. Such an outsourced security service is called Managed Security Services (MSS) and the service provider provider is called Managed Security Service Provider (MSSP).

Key Program Metrics:

  • Service Level Agreements :

    No of…
Continue

Added by CISO Platform on November 28, 2019 at 2:00pm — No Comments

100 Top Security Influencers To Follow In 2020

We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 8 categories – CISO, Ethical Hackers, Innovator, Author, Appsec , Academia & Media/Analyst.

As a part of our CISO Platform 100 (Global)…

Continue

Added by CISO Platform on November 13, 2019 at 1:27pm — No Comments

9 Critical Capabilities For Digital Risk Protection Program

Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purchasing DRP tools as net-new solutions for their organizations (as opposed to replacing an existing capability). They’re adding DRP to their existing security technology stacks to better tackle digital risk activities — namely, to improve…

Continue

Added by CISO Platform on October 24, 2019 at 12:41pm — No Comments

Short Guide On Attack Surface Analysis

A report by Frost & Sullivan found that more than 80% of survey respondents admit to using non-approved applications in their jobs.If you don’t know what to protect, then you cannot protect.

Creating an asset inventory is the first step of any cyber security management function. However due rapid digitization, cloud adoption, IoT adoption and agile disperse teams, 3rd party integrations etc cyber…

Continue

Added by CISO Platform on October 24, 2019 at 12:00pm — No Comments

Learn More About the Key Use Cases Of Network ATP Technology

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.

Advance threat protection is not about a single security solution, It is about a combination of security…

Continue

Added by CISO Platform on September 4, 2019 at 12:37pm — No Comments

Key Program Metrics of Endpoint Detection and Response (EDR)

An emerging technology, Endpoint Detection and Response (EDR) constitutes a set of tools and solutions that enterprises use to detect, investigate and mitigate suspicious activities on hosts and endpoints. The term was originally called as Endpoint Threat Detection and Response (ETDR) but it is more popular as EDR.

Key Program Metrics:

Level of…

Continue

Added by CISO Platform on September 4, 2019 at 11:28am — No Comments

Key Program Metrics for Threat Intelligence (TI)

Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and respond to any kind of cyber attacks. Threat intelligence as applied in conventional security is  any information that helps you tune your security defenses, build an effective response program for any contingency and also if required take preemptive…

Continue

Added by CISO Platform on September 3, 2019 at 2:18pm — No Comments

How to choose your Security / Penetration Testing Vendor?

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization. Another reason to hire a security testing company is that one may find it difficult to hire and retain Penetration Testers.…

Continue

Added by CISO Platform on September 3, 2019 at 9:30am — No Comments

The Legal Case for Capital One AWS Security Breach + A Short Synopsys

Capital One data breach affected over 106 million people, 140,000 Social Security numbers, 80,000 bank account numbers,1,000,000 Social Insurance Numbers ... The breach had taken place about 4 months back however it took some time before the breach was realised, in-fact it took an external tip for Capital One to realise something had happened.

The legal case built was quite interesting. Before I share the legal case link heres a short summary just in-case you dont know…

Continue

Added by CISO Platform on August 6, 2019 at 12:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service