Priyanka Aash's Blog (35)

Fireside Chat: Future of Offensive Attack Simulation - Strategies, Tools & Techniques

In our recent Fireside chat episode in association with FireCompass, between Matthew Rosenquist, CISO Eclipz, and Bikash Barai, Co-Founder, FireCompass, we discussed a bunch of things related to the cybersecurity practices that are gaining momentum and about what the future holds. 

What are some…

Continue

Added by Priyanka Aash on November 24, 2020 at 3:00pm — No Comments

Hands on Workshop: Shifting From Pentest To Continuous Automated Red Teaming (CART) @ Best In the world Of Security Summit - 2020



FireCompass is conducting a two-day Hands-on workshop on “Shifting from Pentest to Continuous Automated Red Teaming (CART)” @ Best In the world Of Security Summit - 2020 

Click here to register

CISO Platform Virtual Conference brings together the best of…

Continue

Added by Priyanka Aash on November 4, 2020 at 8:30pm — No Comments

FireCompass Unveils New AI-Powered Continuous Automated Red Teaming (CART) Platform That Mimics Thousands Of Hackers

Boston October 14, 2020FireCompass today unveils its new artificial intelligence-powered Continuous Automated Red Teaming (CART) platform that mimics thousands of hackers trying to break into an organization. The solution enables organizations to launch continuous safe attacks to identify blind spots before hackers do. Created by a team of serial cybersecurity entrepreneurs, FireCompass’ product is already…

Continue

Added by Priyanka Aash on October 15, 2020 at 10:00am — No Comments

Benchmarking Deception Solutions

With the evolving threat landscape, breaches are becoming increasingly common. As per Ponemon Institute, in 2017, the average time required to detect a breach was 191 days and the average time required to contain a breach was 66 days. These time frames can have a significant impact on businesses relying on technology for their continued operations. Deception as a strategy has always been a critical element for detecting threats and adversary behavior.…

Continue

Added by Priyanka Aash on October 13, 2020 at 9:39am — No Comments

Top DLP Vendors

Frequently Compared DLP Products

Forcepoint Vs. Intel Security
InfoWatchVs. Clearswift
Data Resolve Vs. Somansa…
Continue

Added by Priyanka Aash on October 13, 2020 at 9:36am — No Comments

Top CASB Vendors

Frequently Compared CASB Products

Imperva Vs. Palerra
CipherCloud Vs. Nestskope
Skyhigh Vs. Bluecoat
Imperva Vs. Nestskope
CipherCloud Vs. Palerra
Skyhigh Vs. CipherCloud…
Continue

Added by Priyanka Aash on October 12, 2020 at 6:49pm — No Comments

EDR Top Vendors

Frequently Compared EDR Products

Check Point Vs. Palo Alto
FireEye Vs. Symantec
Tripwire Vs. Trend Micro
Bromium Vs. CrowdStrike
CyberBit Vs. Panda Security
Symantec Vs. Cisco…
Continue

Added by Priyanka Aash on October 12, 2020 at 6:43pm — No Comments

EDR Top Vendors

Frequently Compared EDR Products

Check Point Vs. Palo Alto
FireEye Vs. Symantec
Tripwire Vs. Trend Micro
Bromium Vs. CrowdStrike
CyberBit Vs. Panda Security
Symantec Vs. Cisco…
Continue

Added by Priyanka Aash on October 12, 2020 at 6:43pm — No Comments

WAF Top Vendors

Frequently Compared WAF Products

Cloudfare Vs. Penta Security
Imperva Vs. Trustwave
Radware Vs. Denyall
f5 Networks Vs. Fortinet
Akamai Vs. Citrix
Cloudfare Vs. Fortinet…
Continue

Added by Priyanka Aash on October 12, 2020 at 5:23pm — No Comments

RASP Competitors

Frequently Compared RASP Products

HPE Vs. Immunio
IBM Vs. Veracode
Immunio Vs. Prevoty
Contrast Security Vs. HPE
Prevoty Vs. Veracode
IBM Vs. Contrast Security…
Continue

Added by Priyanka Aash on October 12, 2020 at 5:16pm — No Comments

Discover Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs. Anomali…
Continue

Added by Priyanka Aash on October 12, 2020 at 4:56pm — No Comments

IAM Competitors

Frequently Compared IAM Products

IdentityIQ Vs. RSA via Access
SAP Vs. CA Technologies
Omada Vs. Courion
Dell Vs. Evidian
CA Technologies Vs. IdentityIQ
Hitachi Vs. Entrust…
Continue

Added by Priyanka Aash on October 12, 2020 at 4:42pm — No Comments

EMM Top Vendors

Frequently Compared EMM Products

Sophos Vs. Microsoft
SAP Vs. Soti
Sophos Vs. Citrix
MobileIron Vs. IBM
VMware Vs. Blackberry
Microsoft Vs. Landesk…
Continue

Added by Priyanka Aash on October 12, 2020 at 4:22pm — No Comments

Compare NGFW security vendors

Frequently Compared Vulnerability Assessment Tools

Cisco Vs. Fortinet
CheckPoint Vs. Juniper
Watchguard Vs. Barracuda
Forcepoint Vs. Cisco
Qosmos Vs. Fortinet
Juniper Vs.…
Continue

Added by Priyanka Aash on October 12, 2020 at 4:17pm — No Comments

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs.…
Continue

Added by Priyanka Aash on October 12, 2020 at 3:52pm — No Comments

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs.…
Continue

Added by Priyanka Aash on October 12, 2020 at 3:52pm — No Comments

Compare Vendors of Threat Intelligence

Frequently Compared Threat Intelligence Products

Area1 Vs. Vectra
BugThreats Vs. Zerofox TI
Anomali Vs. Falcon-Intelligence
DeepSight Intelligence Vs. ThreatSmart
Zerofox TI Vs.…
Continue

Added by Priyanka Aash on October 12, 2020 at 3:52pm — No Comments

Vulnerability Assessment Tools Comparison

Frequently Compared Vulnerability Assessment Tools

Nessus Vs. Qualys
SaintScanner Vs. Nexpose 
McAfee Vs. FusionVM…
Continue

Added by Priyanka Aash on October 12, 2020 at 3:38pm — No Comments

Vulnerability Assessment Tools Comparison

Frequently Compared Vulnerability Assessment Tools

Nessus Vs. Qualys
SaintScanner Vs. Nexpose 
McAfee Vs. FusionVM…
Continue

Added by Priyanka Aash on October 12, 2020 at 3:30pm — No Comments

Measuring Your Organization’s Security Preparedness & Maturity Score

Key Learnings

-Models/Frameworks To Measure Cyber Security Maturity & Preparedness Score

-How To Benchmark Your Security Stack Against Peers

-How To Identify Security Portfolio Gaps, Overlaps & Prioritize Investments?

View the Webinar here

Added by Priyanka Aash on October 12, 2020 at 1:55pm — No Comments

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */