The cybersecurity industry had challenges with bringing in new blood and facilitating the career growth. Misinformation has unfortunately played a part in making various roles appear unattainable, when we should be doing the opposite. We should be
Security (147)
Recently introduced Ransomware and Financial Stability Act (H.R.5936) is the right direction for undermining ransomware attacks, by disallowing payments, but it just does not go far enough. This proposal only benefits traditional financial institutio
One of the greatest challenges for a cybersecurity leader is to convey the present digital risks upward to the c-suite and Board of Directors. Representing to executive leadership the value of security, which protects the organization’s assets, reput
The 2021 Front Lines cybersecurity conference brought together a panel to discuss the challenges faced by the industry with growing security threats and far too cybersecurity professionals to combat them. The “Closing the Cyber Skills Gap” panel feat
Industries must either take security, privacy, and safety seriously or find themselves burdened under the crushing blanket of regulatory oversight.
A recent announcement by the European Commission that the Radio Equipment Directive will be updated to
Once an abstract and futuristic concept, the cloud has now extended its very tangible tendrils into nearly all aspects of the modern enterprise. In fact, the abundance of cloud options that organizations enjoy today has become somewhat of a liability
1. Internet access monitoring (use free tools available on android/appstore)
In order for children to start using the Internet they must be under the care of an adult. It is not a matter of violating privacy by spying on what they do, but of evaluatin
Without trust, the adoption slows and therefore spending diminishes over time, which reduces available resources for innovation. Everything becomes inhibited and our digital world stagnates or grinds to a halt.
Cybersecurity (security, privacy, and sa
Static Application Security Testing (SAST)
SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.
Pros
• SAST can pin point the code where
1. Run Time Application Security Protection (RASP)
Today applications mostly rely on external protection like IPS (Intrusion Prevention Systems), WAF (Web Application Firewall)etc and there is a great scope for a lot of these security features bei
Writing not only functional but secure applications is not a new concept or idea that has taken the Industry by storm. However, many Government and Commercial Organizations are still not adhering to or requiring their Organizations to adopt, implemen
Top steps during the implementation of a project related to Database Security
1.As most of the times, application developers or persons implementing the applications also work as database administrators, it is important that database administration i
Requirement for solutions related to Database security
A CISO should define the requirement for solutions related to Database security by first understanding the business and threat environment and decide on the most applicable threats and security p
"The good guys need to be right all the time. The bad guys just need to be right once."
From recent Target shops in US being compromised with 40 million shopper's card details, last minute shoppers are well discouraged. So is action after being com
We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking (CPSMM), in which 331 companies have participated. The data has been collected through the survey conducted online as well as during
Top Steps During Implementation Of A Firewall Project
- Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
For more details and agenda: Click Here
Nominate Yourself (Last Date 25th Jan 2025):…
- Created by: Biswajit Banerjee
CISO Platform: CISO 100 Awards & Future CISO Awards, USA 2025
- Description:
Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. We're reaching out to you because we believe you know someone deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !
For more details: Click Here
Nominate Yourself (Last Date 15th Feb 2025): …
- Created by: Biswajit Banerjee