CISO Platform's Blog (185)

Hacking Traffic Control Systems

Added by CISO Platform on August 14, 2014 at 2:29am — No Comments

Acquire Current User Hashes without Admin Privileges

Added by CISO Platform on August 14, 2014 at 2:23am — No Comments

Attacking the Traveling Salesman

Added by CISO Platform on August 14, 2014 at 2:20am — No Comments

Dropping Docs on Darknets: How People got Caught

Added by CISO Platform on August 14, 2014 at 2:15am — No Comments

Practical Foxhunting

Added by CISO Platform on August 14, 2014 at 2:09am — No Comments

Dont DDoS Me

Added by CISO Platform on August 14, 2014 at 2:00am — No Comments

Protecting SCADA from the Ground Up

Added by CISO Platform on August 14, 2014 at 1:30am — No Comments

Doubling Down On DDoS Mitigation Services - Forrester's Report

Today, DDoS attacks are one of the most prevalent cyberassaults in our constantly changing threat landscape. Bank of America, MasterCard, PayPal, Sony, Visa, and many more of the world’s largest companies have all been victims of DDoS attacks. These unpredictable attacks continue to increase and grow in sophistication by the day. The availability of an organization’s critical systems depends on its ability to…

Continue

Added by CISO Platform on July 11, 2014 at 2:00pm — No Comments

Firewall Checklist - Top 10 Things Your Next Firewall Must Do!

The next-generation firewall is well defined by Gartner as something new and enterprise-focused “incorporating full-stack inspection to support intrusion prevention, application-level inspection and granular policy control” .

Most network security vendors are…

Continue

Added by CISO Platform on May 8, 2014 at 5:30pm — No Comments

Vulnerabilities Across Different Verticals (IBM Report)

We know all too well how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly.

>>Apply…

Continue

Added by CISO Platform on January 21, 2014 at 4:30pm — No Comments

Threat Assessment and Mitigation Checklist

The network security industry recommends that an organization periodically perform risk modeling,assessment, and risk management to anticipate and take pro-active measures against threats.

(Read more:  Top 5…

Continue

Added by CISO Platform on January 2, 2014 at 12:00am — No Comments

2012 Trend and Risk Report

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents—which had already hit a new high in 2011—continued their upward trajectory.

(Read more:  …

Continue

Added by CISO Platform on December 31, 2013 at 11:30am — No Comments

Cyber Security Intelligence Index - Top Security Breaches, Checklist to Control & Mitigate Risk

 

Breaches are daily.And we all know that every device is compromised, to what extent remains mystery!

The security experts believe that being ready for the battle can make the journey smoother. Learn the optimal plan to reduce the risks and know what to do in-case of a breach.(Read more: …

Continue

Added by CISO Platform on December 23, 2013 at 1:30am — No Comments

An Overview on Cloud Security

Overview on Cloud Security

Cloud adoption is an inevitable choice in today’s dynamic environment, yet many organizations are hesitant to fully leverage the benefits of the cloud, considering concerns regarding data loss and unauthorized access .

Today Cloud Services are broadly offered in three medium popularly known as IAAS(Infrastructure as a Service) , PAAS ( Platform as a Service) & SAAS(Software as a Service ). Over the past…

Continue

Added by CISO Platform on November 3, 2013 at 2:30pm — No Comments

CISO Guide for Denial-of-Service (DoS) Security

Denial-of-Service (DoS) attacks have existed since the early days of computing and have evolved into complex and overwhelming security challenges. Organizations have had to worry not just about DoS attacks, but Distributed DoS attacks (DDoS), and more recently, Distributed Reflector DoS (DRDoS) attacks. Additionally the size, complexity, and sophistication of DDoS attacks are increasing at alarming rates.

In general distributed denial-of-service (DDoS) attacks target network…

Continue

Added by CISO Platform on September 12, 2013 at 12:30pm — No Comments

Build vs Buy - Forrester's Security & Risk Practice Playbook

http://www.cisoplatform.com/page/build-vs-buy-forrester-s-security-risk-practice-playbook

Why Read This Report

This report outlines a sourcing strategy and Forrester’s decision support solution for security and risk (S&R) …

Continue

Added by CISO Platform on September 3, 2013 at 11:30pm — No Comments

Action List Before Adopting a Cloud Technology

Firstly the CISO has to work with the CIO and the business to understand the business need to implement this and then clearly articulate associated risk exposure to the firm and its stakeholders.

A detailed due diligence has to be completed following which the risk posture and risk mitigation guidance has to be provided. Subsequently a corporate policy along with the mitigating controls has to be implemented and training imparted to the relevant business users.

( Read more: …

Continue

Added by CISO Platform on August 28, 2013 at 4:00pm — 1 Comment

Technology/Solution Guide for Single Sign-On

Top technologies / solutions available for the Single Sign-On are :

1.Common Standard Solutions:

  • The Generic Security Service Application Program Interface GSS-API.
  • OSF Distributed Computing Environment DCE.
  • Pluggable Authentication Modules PAM

 2.Broker-Based SSO Solutions: having one server for central authentication & user account management.                  

  • Kerberos: Trusted Kerberos…
Continue

Added by CISO Platform on August 28, 2013 at 3:30pm — 1 Comment

Database Security Vendor Evaluation Guide



Requirement for solutions related to Database security

A CISO should define the requirement for solutions related to Database security by first understanding the business and threat environment and decide on the most applicable threats and security parameters while balancing performance of application and security.

( Read more: …

Continue

Added by CISO Platform on August 28, 2013 at 2:00pm — No Comments

My Key Learning While Implementing Database Security



Top steps during the implementation of a project related to Database Security



1.As most of the times, application developers or persons implementing the applications also work as database administrators, it is important that database administration is handled by different persons in the team. For bigger projects, you should have a separate database team. This helps on most of the occasions to have better control on database management and…

Continue

Added by CISO Platform on August 28, 2013 at 1:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service