Are you planning to Implement the Advanced Persistent Threats (APT) Security?. It's important to know what all questions you need to ask to APT security Vendor and get their views on APTs. Also, be sure whether the solution you are going to buy is ca
To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked ba
In its June 2, 2016 notification, RBI has issued new cybersecurity guidelines, which says that scheduled commercial banks (private, foreign and nationalized banks listed in the schedule of RBI Act, 1934) must proactively create or modify their polici
RansomWare is a type of malicious software (malware) when infected with encrypts all the important files such as documents, pictures, movie file etc with a virtually unbreakable encryption key. [RM1] The RansomWare arrives via email attachments, inse
Emerging Vendors are the vendors who have been innovative and has given the fresh perspective to the conventional security methods. In very less time, these start-ups have been able to make their name in the APT space. Here is the list of the Top Eme
Today, I am going to talk about the game which has become more than a game for people around the world. You guessed it right, I am talking about Pokemon Go, developed by Niantic. The important mechanic in the game is to be able to use GPS which can t
Cyber security is an increasing concern for every business. And especially for banks who held a lot of confidential data and transaction details, it is utmost important for banks to have required cyber security solution and processes at the place.
This is about developing information security master plan, the concept is the fact that when you develop a plan you begin by starting risk assessment, not a risk assessment from security stand point but from a business standpoint. You go through that
This Guide examined the field of security architecture from the point of view of security governance. It explains how security architecture governance can be created as a sub-field of security governance and how the principles and structure of the sa
CISO Platform 100, 2018 (India):
Applications for the Top 100 CISO Awards is open for 2018. Kindly fill in your responses asap.
We are very happy to announce that nominations are now open for the 7th Edition of Top 100 CISO Awards - India's 1st Securit
IoT security is being approached by many organizations and from different perspectives . In this post we give a birds eye view of the players.This is not intended to be comprehensive. We will supplement this in time with deeper dive at different la
Building a Strategic Plan for Your Security Awareness Program (RSA Conference 2017)
The key to securing your employees behaviors is an effective strategic plan that is both realistic and supported by your leadership. Learn how other organizations are
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC, this paper will outline the typical
There are four phases in Cyber Crisis Management, namely Detection, Response, Containment &amp; Recovery. Here is a glimpse of the four phases.
This report identifies11 most significant Security Analytics (SA) providers — BAE Systems, E8 Security, Fortinet, Hewlett Packard Enterprise (HPE), Huntsman Security, IBM, Intel Security, LogRhythm, RSA, Securonix, and Splunk.
This report shows how e
The notorious hackers are increasingly planting more sophisticated attack. With Social engineering and phishing emails proliferating each day, having a strong and robust security awareness program is of paramount importance for securing company’s ass
Speakers: Bikash Barai [ Co-Founder @FireCompass ] & Ravi Mishra [ Co-Founder & Product management @FireCompass ]
Author - Anil Upadhyay, DM - ITGS, ITSD, Gujarat Gas Limited
We have listed a Key Parameter are required for Security Incident and Event Management and The Framework was attached at the end.
Major Parameters To Consider :
Ability to identify non
Organizations around the globe are investing heavily in cyber defense capabilities to protect their critical assets. Whether protecting brand, intellectual capital, and customer information or providing controls for critical infrastructure, the means
Note: this page contains paid content.
Please, subscribe to get an access.
- Learn about the current state of detection and modern detection requirements
- Review the most used detection rules and how they could be improved
- Seven tips to help you improve your detection rules
- Created by: pritha
- Develop a comprehensive, defensive security posture to protect against ransomware
- Tools to discover and monitor attack surface to identify the entry points of attackers
- Designing a cyber resilience program and incident response program
- Created by: pritha