Meghana P's Blog (37)

A Guide to Choosing a Next-Generation Firewall

Now that we have examined the differences between traditional firewalls and the next generation firewalls (NGFW), let's look at five of the top NGFW solutions from Cisco, CheckPoint, Fortinet, WatchGuard and Dell (SonicWALL).

It is important to note that these five vendors were selected as they were highlighted in the most recent industry reports; they're not the only NGFW vendors on the market today and enterprises have other…

Continue

Added by Meghana P on June 10, 2019 at 2:00pm — No Comments

A Cautionary Tale about Next Generation Firewalls…

Businesses and organizations are fielding more & more next-generation Information Security technologies to reduce their risks as businesses leverage cloud capabilities and from advanced persistent threats. Unfortunately, we see our customers falling into a common Information Technology and general acquisition trap: Significantly underestimating the complexity, cost, and time to complete the Next Generation Firewall (NGFW)…

Continue

Added by Meghana P on April 4, 2019 at 2:27pm — No Comments

How Google Protects Its Corporate  Security Perimeter without Firewalls

How Google Protects Its Corporate  Security Perimeter without Firewalls (RSA Conference 2017)

The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its ground breaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place,…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

Cybersecurity vs. Tokenization

Cybersecurity vs. Tokenization (RSA Conference 2017)

Tokenization is the latest data protection method, but does it help or hinder cybersecurity-this is the current debate. This session will look at who, what, where, when, how and why of using tokens.

Detailed Presentation:…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

Hacking Blockchain

Hacking Blockchain (RSA Conference)

Bitcoin has exploded in popularity and skyrocketed in value. Proponents of blockchain, the technology that makes cryptocurrency possible, now want to apply it to a wide range of other applications like identity management, verifiable records and digital assets such as stocks. Is the industry building new systems on a cryptographically…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud

IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud (RSA Conference 2017)

In this technical deep dive, Email Isaakian will explain the details of the protocol, cryptography, key management and vulnerabilities mitigated by MAC Sec/ESS. Additionally he'll show use cases to show how to successfully deploy MAC Sec/ESS technologies (Network Encryptors + NVF) to protect your WAN (MPLS, PBBN, Carrier…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

Client side encryption without knowing  its limits is a ticking time bomb!

Client side encryption without knowing  its limits is a ticking time bomb! (RSA Conference 2017)

Cloud and mobile computing give room to an unprecedented level of access points into corporate data leaving you to rethink how to protect it. Client-side encryption is increasingly being used as a solution. While it solves the problem of unauthorized access, it is still in its infancy and has many limitations and…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

Open Security Controller - Security  Orchestration for OpenStack

Open Security Controller - Security  Orchestration for OpenStack (RSA Conference 2017)

Open Security Controller enables orchestration of multiple security functions in an OpenStack DC. OSC integrates with multiple SDN controllers and Security VNFs to automate protection of DC resources.

Detailed…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection

The Strategic Advantage of Adaptive Multi-Engine Advanced Threat Protection (RSA Conference 2017)

The dramatic rise in malicious code designed to evade detection, specifically from network sandboxes, caused industry analysts to suggest the deployment of multiple network sandboxes for the same network. Learn how to maximise protection from advanced persistent threats by using multiple security…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

Fighting Cybercrime Using the Blockchain

ghting Cybercrime Using the Blockchain (RSA Conference 2017)

Bitcoin is sometimes described as the “currency of criminals,” and we all see stories about how criminals use bitcoin to move money and extract ransoms. But did you know that law enforcement also uses the blockchain—bitcoin’s distributed, immutable, permanent record of transactions—to investigate cybercrime? Come learn more about how…

Continue

Added by Meghana P on May 4, 2017 at 11:00am — No Comments

Intelligence-Led Security: Powering the Future of Cyber-Defense

Intelligence-Led Security: Powering the Future of Cyber-Defense (RSA Conference 2017)

A new class of intelligence-led security is powering the future of cyber-defense, driven by deeper and broader visibility into the attacker ecosystem. This session will look at how intelligence is influencing the development of security products/services and how defenses will benefit from the integration of…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts

A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts (RSA Conference 2017)

Despite the positive advancements in machine learning and intelligence, security professionals remain overwhelmed. How is it that we keep wasting time and energy on analyzing and assembling the information presented by our supposedly “intelligent” solutions? This session will explore a conjoint…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team

Keeping Up with the Adversary: Creating a Threat-Based Cyber-Team (RSA Conference 2017)

With advanced cyber-actors evolving quickly and becoming more stealthy, it has become imperative to question the status quo of our existing cyber-operations. This session will outline how a case study and incident response led to changes in focus and philosophy and how that changed the structure of Defensive Cyber…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

A Fully Automated SOC: Fact or Fiction

A Fully Automated SOC: Fact or Fiction (RSA Conference 2017)

Organizations continuously look to drive more value with less resources for their security operations. The deluge of data and lack of skilled security professionals highlight the critical need for automation to help manage today’s sophisticated attacks, but is it feasible to automate everything? HPE Security will discuss the potential for security…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

Isolating the Ghost in the Machine: Unveiling Post Exploitation Threats

Isolating the Ghost in the Machine: Unveiling Post Exploitation Threats (RSA Conference 2017)

During the past year IR teams and security researchers around the world witnessed a rise in the use of legitimate tools and common scripts in malware and APT attacks. This talk will explore the presenters’ research that focused on automating the analysis of PowerShell and Macro/VBA/VBS attacks by building a…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

Your Sector Doesn’t Matter:  Achieving Effective Threat Prioritization

Your Sector Doesn’t Matter:  Achieving Effective Threat Prioritization ( RSA Conference 2017)

Many organizations’ security functions determine what threats they care about based on what threats are known to be affecting their sector, or comparably simple criteria. In reality, this approach is poorly suited to dealing with the significant security issues of today. Malicious actors scope their victims based on…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

The Human Exploitation Kill Chain

The Human Exploitation Kill Chain (RSA Conference 2017)

Whenever a user falls victim to a phishing or other social engineering attack, or makes an error, critics claim awareness efforts are useless. However, if a single user action can compromise an entire security program, the problem is the security program. This presentation will detail how technology, process and awareness should combine to stop human…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

Lessons from Billions of Breached Records

Lessons from Billions of Breached Records (RSA Conference 2017)

What motivates attackers to dump data publicly? How is it sold, traded and redistributed? These are questions the presenter dealt with while running the ethical data breach search service “Have I been pwned.” This talk will share the lessons from working with more than a billion publicly dumped records and provide a unique inside look at security…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

Weaponizing Intelligence: Interdiction in Today’s Threat Landscape

Weaponizing Intelligence: Interdiction in Today’s Threat Landscape (RSA Conference 2017)

The threat environment is evolving every single day. As adversaries find more efficient and effective ways of making money they will reinvest that money to create more advanced and evasive malware. Disrupting that economy is key. This talk will focus on moving from gathering threat intelligence toward providing consistent…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments

Achieving and Measuring Success with the Security Awareness Maturity Model

Achieving and Measuring Success with  the Security Awareness Maturity Model (RSA Conference 2017)

Far too often security awareness officers are not sure what stage their awareness program is at, what success looks like or what path to take to achieve their goals. Learn how others have used the proven Security Awareness Maturity Model to build, maintain and measure a mature awareness…

Continue

Added by Meghana P on May 4, 2017 at 10:30am — No Comments


Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2021   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */