Gireesh Kumar's Blog (63)

The Forrester Wave : Security Analytics Platforms, Q1, 2017

This report identifies11 most significant Security Analytics (SA) providers — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk.



This report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice.

>>…

Continue

Added by Gireesh Kumar on May 2, 2017 at 7:30pm — No Comments

Building a Successful Security Operations Center (SOC) - CISO Platform

This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC, this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as the technology involved.

In depth understanding including graphical representation and process flow diagrams.…

Continue

Added by Gireesh Kumar on April 24, 2017 at 12:30pm — No Comments

How To Build Your Mobile Security Strategy

The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own.

While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in…

Continue

Added by Gireesh Kumar on April 10, 2017 at 8:00pm — No Comments

CISO Guide: Enterprise Mobility Management (EMM) Productivity Transformation Report

As more people use mobile devices to work, what are the key elements of an Enterprise Mobility Management (EMM) solution that successfully allow content creation, editing, sharing, syncing and pushing to mobile devices? …



Continue

Added by Gireesh Kumar on April 6, 2017 at 12:00pm — No Comments

CISO Guide: Mobile Security & Business Transformation Study

Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business

Ninety-nine percent of the enterprise workforce currently uses mobile devices - smart phones and tablets - to perform their jobs today. And nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits.…

Continue

Added by Gireesh Kumar on February 28, 2017 at 3:00pm — No Comments

NIST Critical Security Framework (CSF) (Annual Summit Presentation)

Speaker : Richard Bussiere, Principal Architect @ Tenable Network Security

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent the…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:52pm — No Comments

IoT Security Taskforce (Annual Summit Presentation)

Speaker : Arvind @ TiE



*We suggest you use…
Continue

Added by Gireesh Kumar on December 6, 2016 at 12:45pm — No Comments

Security Strategy and Tactic with Cyber Threat Intelligence (CTI) (Annual Summit Presentation)

Speaker: Reinhold Wochner @ Raiffeisen Bank International…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:42pm — No Comments

Using Behavioral Psychology and Science of Habit to Change User Behavior (Annual Summit Presentation)

Speaker: Bikash Barai [ Founder & CEO @ Cigital, Inc]…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:34pm — No Comments

CISO Platform Annual Summit, 2016 Highlights

CISO Platform Annual Summit @ Goa, last week saw over 100+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keynotes, electrocuting Turbo sessions and some great knowledge boost training sessions.

International Experts like CTO of Xerox, Black Hat Review Board Member, Ex-CISO at Israeli…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:30pm — No Comments

The (non) - Evolution of Security (Annual Summit Presentation)

Speaker: Matt Suiche, Co - Founder & Chief Scientist @ Cloud Volumes

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note -…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:29pm — No Comments

Sneak Peek into Emerging Health Care Tech & Future Security Impact (Annual Summit Presentation)

Speaker: Kenneth Bradberry, CTO @ Xerox Healthcare

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:00pm — No Comments

Kill the Password (Annual Summit Presentation)

Speaker: Tamaghna Basu, CEO @ neoEYED

*We suggest you use Chrome to view the slides, as the it may be inaccessible on other browsers like safari etc.

Please Note - Speaker presentations represent…

Continue

Added by Gireesh Kumar on December 6, 2016 at 12:00pm — No Comments

Intra process memory protection for applications on ARM and x86

Intra process memory protection for applications on ARM and x86



Today's software needs to isolate not only processes but the many components *within* a process from each other. Process-level isolation via jails, sandboxes, VMs, or hypervisors is finally becoming mainstream, but it misses an important point about modern software: its growing number of libraries that are all loaded into the same address space, and may all interact…

Continue

Added by Gireesh Kumar on November 25, 2016 at 12:02pm — No Comments

Samsung pay: tokenized numbers flaws and issues (Black Hat Conference 2016)

Samsung pay: tokenized numbers flaws and issues

Samsung announced many layers of security to its Pay app. Without storing or sharing any type of user's credit card information, Samsung Pay is trying to become one of the most secure approaches offering functionality and simplicity for its customers. This app is a complex mechanism which has some limitations relating security. Using random tokenize numbers and implementing Magnetic Secure Transmission…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:57am — No Comments

Applied Machine learning for data exfiltration and other fun topics (Black Hat Conference 2016)

Applied Machine learning for data exfiltration and other fun topics

The goal of this presentation is to help researchers, analyst, and security enthusiast get their hands dirty applying machine learning to security problems. We will walk the entire pipeline from idea to functioning tool on several diverse security related problems, including offensive and defensive use cases for machine learning. Through these examples and demonstrations, we will…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:57am — No Comments

Memory forensics using VMI for cloud computing (Black Hat Conference 2016)

Memory forensics using VMI for cloud computing

The relocation of systems and services into cloud environments is on the rise. Because of this trend users lose direct control over their machines and depend on the offered services from cloud providers. These services are especially in the field of digital forensics very rudimentary. The possibilities for users to analyze their virtual machines with forensic methods are very limited. In the…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:55am — No Comments

Building trust and Enabling innovation for voice enabled IOT

Building trust and Enabling innovation for voice enabled IOT



Voice enabled technology provides developers with great innovation opportunities as well as risks. The Voice Privacy Alliance created a set of 39 Agile security stories specifically for voice enabled IoT products as part of the Voice Privacy Innovation Toolkit. These security stories help product owners and security developer focals bake security into their voice enabled products…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:50am — No Comments

Attacking bluetooth smart devices: introducing a new BLE proxy tool

Attacking bluetooth smart devices: introducing a new BLE proxy tool



Bluetooth Low Energy is probably the most thriving technology implemented recently in all kinds of IoT devices: gadgets, wearables, smart homes, medical equipment and even banking tokens. The BLE specification assures secure connections through link-layer encryption, device whitelisting and bonding - a mechanisms not without flaws, although that's another story we are…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:47am — No Comments

Account jumping post infection persistency and lateral movement in AWS (Black Hat Conference 2016)

Account jumping post infection persistency and lateral movement in AWS

The widespread adoption of AWS as an enterprise platform for storage, computing and services makes it a lucrative opportunity for the development of AWS focused APTs. We will cover pre-infection, post-infection and advanced persistency techniques on AWS that allows an attacker to access staging and production environments, as well as read and write data and even reverse its…

Continue

Added by Gireesh Kumar on November 25, 2016 at 11:46am — No Comments

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service