Information (15)

Freedom requires free-speech, but liberty requires truth! We must crush misinformation before it destroys society. Yes, I have an idea how we can protect freedoms and greatly reduce the downward-spiraling thrash of misinformation in our society. It
Read more…

WHY APPSEC (APPLICATION SECURITY) WON’T ALWAYS BAIL YOU OUT OF APPLICATION BASED RISKS?

It is very typical of organizations to perform Web Application (WebApp) Security Assessments before the go-live of newer applications or periodic assessments of th

Read more…

Top steps during the Implementation of a DRM project-Points to consider for the implementation of a project:

  •  Ensure the security and document management with centralized storage. Design using open source architecture, as much as possible
  • Search of
Read more…

To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked ba

Read more…

Top 100 CISO Awards, 2018

8669811064?profile=original

CISO Platform 100, 2018 (India):

Applications for the Top 100 CISO Awards is open for 2018. Kindly fill in your responses asap.

We are very happy to announce that nominations are now open for the 7th Edition of Top 100 CISO Awards - India's 1st Securit

Read more…

The project title for this task force is “Cyber Security Maturity Model for Organizations”. Some of the key things that you are going to learn from this presentation is:

  • The user organizations will learn, how to easily adapt a cyber security maturity
Read more…

There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk

Read more…