Social Network For Security Executives: Network, Learn & Collaborate
2014 has been a great year at CISO Platform. We had around 1500 new senior executives joining the platform and published 120 new articles on security. Here are some of the best ones from 2014.
Added by pritha on January 31, 2015 at 6:00pm — No Comments
Watch Video:
5 Real ways to destroy business by breaking SAP Applications
Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into…
ContinueAdded by pritha on January 31, 2015 at 5:30pm — No Comments
Here is an interesting webinar on the 'Insecurities of Security Products'. More often we consider the security vulnerabilities in products apart from security products. It is ironic how a product devised to provide security can also make you more susceptible to compromise. How-So will be demonstrated through a few examples.
3 Industry experts had joined us in this webinar-
Added by pritha on January 31, 2015 at 5:30pm — No Comments
Watch Talk:
(Read more: 5 Best Practices to secure your Big Data Implementation)
BadUSB — On accessories that…
ContinueAdded by pritha on January 31, 2015 at 5:30pm — No Comments
Watch Video:
(Read more: Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)
Ants and Elephants in the…
ContinueAdded by pritha on January 31, 2015 at 5:30pm — No Comments
Contrary to the common man belief that 'Windows is very insecure', Microsoft has been very proactive in security. Apple iOS has a great deal of security too, it is described in its building from scratch in the iOS security document. Here are the few points I found great for mention. Here's a small video which has the debate on.
Watch video[9 min]:…
ContinueAdded by pritha on January 31, 2015 at 5:30pm — No Comments
From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar discussing the hardware threats.
Part 1: Major Hardware Attacks…
ContinueAdded by pritha on January 13, 2015 at 6:00pm — No Comments
A concise primer to Forensics for a beginner or a security expert- an insight into actual solution achieved through Forensics. The problem states a PGP message intercepted by an RAT and needs to be decrypted without the actual key? The process is briefly defined by the expert himself and takes us through a Forensic lab without the pain ofcourse.
Part1 :Forensics Video Recording…
ContinueAdded by pritha on January 13, 2015 at 5:00pm — No Comments
(Read more: Top 5 Big Data Vulnerability Classes)
Quick…
ContinueAdded by pritha on January 13, 2015 at 5:00pm — No Comments
2020
2019
2018
2017
2016
2015
2014
2013
2012
1999
Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies 0 Likes
Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue
Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies 0 Likes
(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue
Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies 0 Likes
(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue
Started by CISO Platform. Last reply by Bhushan Deo Mar 20, 2020. 12 Replies 0 Likes
(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue
Tags: #COVID19
# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
Follow us
© 2021 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service