CISO Platform's Blog (172)

Interview Series: A CTO perspective on BIG Data, BYOD and Top Security Trends

Jayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the future.

What do you think are the top technologies that will…


Added by CISO Platform on April 8, 2013 at 3:00pm — 1 Comment

5 of the most famous hackers!!!

The Internet has plenty of crackers, known as  "black hats", who work to exploit computer systems.You also have white hats. When hackers are hired by companies to do penetration testing, it's legal and known as white hats. In this section we profile five of the most famous  and all time favourite "black hat"…


Added by CISO Platform on March 29, 2013 at 9:00am — 2 Comments

Compliance and Government Regulations

Due to financial implications caused by several recent high-profile data leakage incidents,enterprises are facing increasing pressure for implementation of stringent norms pertaining to governance and compliance reporting. Today, adhering to governmental and contractual compliance requirements is required not only to continue the business, but also generate value. Failure…


Added by CISO Platform on March 21, 2013 at 3:00pm — No Comments

Data Security: The Next Big Security Focus in India ?

Data explosion and advent of big data are phenomena, which are a result of economic development of

nations and increase in digital footprint of organizations.With more and more devices getting connected to the core business enterprise network, in order to serve the need of anytime-anywhere information access and growing traction of bring your own device (BYOD) in the corporate culture; all contributing to the era of ‘big data’.…


Added by CISO Platform on March 19, 2013 at 1:00am — No Comments

Top Security Threats 2013

Keeping current with the latest threat trends can improve the effectiveness of existing security solutions as it helps to identify and prioritize security gaps that may require new approaches and more innovative strategies.


Key Findings:

  • Web Security - The web became significantly more malicious…

Added by CISO Platform on February 25, 2013 at 5:30pm — No Comments

Interview Series: Security Professional's Guide to Identity & Access management

Saurabh Kaushik,Sr Manager Information Security, Lupin Pharma, talks to CISO Platform on the biggest drivers and barriers of IAM adoption and the top challenges a CISO/organization can face while adopting IAM.

How important is IAM? Why should organizations adopt it?

Identity and Access Management is an integrated set of processes,…


Added by CISO Platform on February 19, 2013 at 3:00pm — No Comments

Gartner Predicts 2013 Local Briefing – Bangalore 8th Feb 2013

Top 10 predictions for 2013 and beyond - Gartner

Top 10 predictions for 2013 and beyond - Gartner Gartner's top predictions for 2013 focus on opportunities, economic risks and innovations that will force CIOs to move to the next generation of business-driven solutions."The priorities of CEOs must be dealt with by CIOs who exist in a…


Added by CISO Platform on February 8, 2013 at 9:00am — No Comments

How MIT website got hacked despite having any vulnerability ?

MIT got hacked.Anonymous defaced the MIT to protest against the case of “Aaron Swartz”.

Without getting into who really hacked or the “cause” behind the protest, I just wanted to dissect it as an interesting case of multi-stage attack which proves that just securing your application is not good enough.…MIT got hacked


Added by CISO Platform on January 24, 2013 at 6:30pm — 2 Comments

Java Zero Day with no patches: Quick fixes to protect!

What is the vulnerability?
The new Java vulnerability with no patch has become the talk of the town. The vulnerability in Oracle Java Runtime Environment (JRE) 1.7 allows an applet to call setSecurityManager in a way that allows setting of arbitrary permissions.
Note: This is a vulnerability in Java and not Javascript.

(


Added by CISO Platform on November 5, 2012 at 2:00pm — No Comments

5 famous all time favourite white hat hackers!!!

White Hat Hackers

White Hat Hackers

Hackers that use their skills for good are classified as white hat. These white hats often work as certified Ethical Hackers,
hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking…


Added by CISO Platform on July 16, 2012 at 10:30pm — No Comments

REST APIs and Next Generation Threats: Part 1

Some days back, when I was going through the record breaking statistics of Facebook and its social networking platform’s REST APIs,  I found phrases likePeople on Facebook install 20 million applications every day. More than 2.5 million websites have integrated with Facebook”. It…


Added by CISO Platform on July 11, 2012 at 1:00pm — No Comments

Anti-Virus… or Door for a hacker?

How hackers can break into your system through anti-virus?
Step 1: Hacker does remote identification of antivirus - Some company Inc is running an antivirus in its mail server. The antivirus checks for every incoming mail for possible virus infection. If the mail is clean, the antivirus passes it and the mail is then forwarded to recipient. Else the mail gets dropped or rejected. The first step of an attacker is to…

Added by CISO Platform on July 5, 2012 at 4:00pm — No Comments

Monthly Archives










© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service