Social Network For Security Executives: Network, Learn & Collaborate
Added by CISO Platform on August 14, 2014 at 2:23am — No Comments
Added by CISO Platform on August 14, 2014 at 2:15am — No Comments
Added by CISO Platform on August 14, 2014 at 1:30am — No Comments
Today, DDoS attacks are one of the most prevalent cyberassaults in our constantly changing threat landscape. Bank of America, MasterCard, PayPal, Sony, Visa, and many more of the world’s largest companies have all been victims of DDoS attacks. These unpredictable attacks continue to increase and grow in sophistication by the day. The availability of an organization’s critical systems depends on its ability to…Continue
Added by CISO Platform on July 11, 2014 at 2:00pm — No Comments
The next-generation firewall is well defined by Gartner as something new and enterprise-focused “incorporating full-stack inspection to support intrusion prevention, application-level inspection and granular policy control” .
Most network security vendors are…Continue
Added by CISO Platform on May 8, 2014 at 5:30pm — No Comments
We know all too well how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastructure, are becoming more severe, more frequent and more costly.
Added by CISO Platform on January 21, 2014 at 4:30pm — No Comments
The network security industry recommends that an organization periodically perform risk modeling,assessment, and risk management to anticipate and take pro-active measures against threats.
(Read more: Top 5…Continue
Added by CISO Platform on January 2, 2014 at 12:00am — No Comments
Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated with advisories and alerts regarding emerging threats. The frequency of data breaches and incidents—which had already hit a new high in 2011—continued their upward trajectory.
(Read more: …Continue
Added by CISO Platform on December 31, 2013 at 11:30am — No Comments
Breaches are daily.And we all know that every device is compromised, to what extent remains mystery!
The security experts believe that being ready for the battle can make the journey smoother. Learn the optimal plan to reduce the risks and know what to do in-case of a breach.(Read more: …
Added by CISO Platform on December 23, 2013 at 1:30am — No Comments
Overview on Cloud Security
Cloud adoption is an inevitable choice in today’s dynamic environment, yet many organizations are hesitant to fully leverage the benefits of the cloud, considering concerns regarding data loss and unauthorized access .
Today Cloud Services are broadly offered in three medium popularly known as IAAS(Infrastructure as a Service) , PAAS ( Platform as a Service) & SAAS(Software as a Service ). Over the past…Continue
Added by CISO Platform on November 3, 2013 at 2:30pm — No Comments
Denial-of-Service (DoS) attacks have existed since the early days of computing and have evolved into complex and overwhelming security challenges. Organizations have had to worry not just about DoS attacks, but Distributed DoS attacks (DDoS), and more recently, Distributed Reflector DoS (DRDoS) attacks. Additionally the size, complexity, and sophistication of DDoS attacks are increasing at alarming rates.
In general distributed denial-of-service (DDoS) attacks target network…Continue
Added by CISO Platform on September 12, 2013 at 12:30pm — No Comments
Why Read This Report
This report outlines a sourcing strategy and Forrester’s decision support solution for security and risk (S&R) …
Added by CISO Platform on September 3, 2013 at 11:30pm — No Comments
Firstly the CISO has to work with the CIO and the business to understand the business need to implement this and then clearly articulate associated risk exposure to the firm and its stakeholders.
A detailed due diligence has to be completed following which the risk posture and risk mitigation guidance has to be provided. Subsequently a corporate policy along with the mitigating controls has to be implemented and training imparted to the relevant business users.
( Read more: …Continue
Top technologies / solutions available for the Single Sign-On are :
1.Common Standard Solutions:
2.Broker-Based SSO Solutions: having one server for central authentication & user account management.
Requirement for solutions related to Database security
A CISO should define the requirement for solutions related to Database security by first understanding the business and threat environment and decide on the most applicable threats and security parameters while balancing performance of application and security.
( Read more: …Continue
Added by CISO Platform on August 28, 2013 at 2:00pm — No Comments
Top steps during the implementation of a project related to Database Security
1.As most of the times, application developers or persons implementing the applications also work as database administrators, it is important that database administration is handled by different persons in the team. For bigger projects, you should have a separate database team. This helps on most of the occasions to have better control on database management and…
Added by CISO Platform on August 28, 2013 at 1:30pm — No Comments