Pritha's Blog – February 2016 Archive (8)

5 Tips To Evaluate Your Readiness Before Implementing Data Loss Prevention (DLP) Solution

Here are some Tips To Evaluate Your Readiness Before Implementing Data Loss Prevention (DLP) Solution:

  • Your organization have developed appropriate policy to govern the use of Data Loss Prevention (DLP) solution

    To draw true value from any DLP deployment an organization…
Continue

Added by pritha on February 26, 2016 at 6:00pm — No Comments

CISO Guide to Next-Gen Criminal Fraud Detection

With the introduction of sophisticated threats, such as advanced phishing, pharming and malware, authentication has become less effective. Authentication methods—including out-of-band and one-time passwords—as well as security questions can be bypassed with minimal effort by fraudsters.

Consequently, more sophisticated authentication techniques…

Continue

Added by pritha on February 22, 2016 at 5:00pm — No Comments

Fortnightly Summary Of Top IT Security News-16th Feb,2016

New White House Cyber security Plan Creates Federal CISO - 9 Feb 2016…



Continue

Added by pritha on February 16, 2016 at 4:30pm — No Comments

5 Questions You Want Answered Before Implementing Enterprise Mobility Management (EMM) Solution

Technology comes with a cost. The cost, one could never have imagined if not properly implemented. Enterprise Mobility Management (EMM) solution at place boosts the productivity, enhances mobile security, and provides easy access to corporate content. However, the important question is whether you are ready for this technology or not?

Here in this…

Continue

Added by pritha on February 12, 2016 at 5:30pm — No Comments

9 Top Features To Look For In Next Generation Firewall (NGFW)



Firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. The rapid growth of new innovative technology and alongside with the massive growth of new security threat, the traditional firewall is not enough to compete. To deal with these changes, vendors in the enterprise firewall market have created a new generation of firewall devices dubbed the Next Generation Firewall or NGFW.

A…

Continue

Added by pritha on February 12, 2016 at 5:00pm — No Comments

11 Ways To Measure The Effectiveness Of Your Identity & Access Management (IAM) Solution

Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue increasing and other tangible benefits that are cost reducing.

Here…

Continue

Added by pritha on February 12, 2016 at 5:00pm — No Comments

Top 6 Reasons Why Data Loss Prevention(DLP) Implementation Fails

Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:

  • Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and formulating DLP policy make implementation…
Continue

Added by pritha on February 10, 2016 at 11:30pm — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service