There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk
Security (153)
We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 fol
Background:
It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.
With any security program, the goal is to identify the vulnerabilities, the relate
This blog lists out 6 key metrics to measure the maturity and effectiveness of your Data Loss Prevention (DLP) program. All the metrics are operational and can be measured quantitatively to help you fine-tune your DLP program.
- Number of policy ex
- Looking for Top Emerging Companies in the Cyber Security Industry? FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have misse
- RSA Innovation Sandbox Contest for the past 12 years has been awarding most innovative information security companies and products. Let’s have a look at those companies who emerged as innovative cyber security startups at RSA Conference 2018.
- BTW,
RSA Innovation Sandbox Contest for the past 12 years has been awarding most innovative information security companies and products. Let’s have a look at those companies who emerged as innovative cyber security startups at RSA Conference 2018.
BTW,
RSA conference is one of the leading security conference worldwide. It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. This blog enlists the top End point
- We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending RSAC 2018, April 16 to 20 in San Francisco.
- BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which y
RSA conference is one of the leading security conference worldwide. It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.
Identity and Access Management is the
Security Maturity Score By Industry :

Identification Capabilities By Industry :

Prevention Capabilities By Industry :

Detection Capabilities By Industry :
Response Capabilities By Industry :
Key Findings :
- Large Indian

- FireCompass, an AI based platform which helps you to discover & compare Cybersecurity products has just announced the names of Top CyberSecurity Startups 2017 (India).
- With the growing cyber attacks, the role of innovations in the cyber-security
We are happy to share that FireCompass has been selected as a winner of NASSCOM’s 2017 Emerge 50 award. At FireCompass our vision is to transform the way enterprises make security strategy and buying decisions.
- Network Forensics is related to the monitoring and analysis of network traffic for the purposes of information gathering, legal evidence collection also to detect and identify any intrusion. Network investigation deals with volatile and dynamic da
- Here is the list of top 5 emerging vendors of MDR Solutions (Managed Detection and Response). But before that let us understand what is the difference between MDR and MSS (Managed Security Services).
MDR vs MSS
- MDR is different from MSS. Managed
Here is the list of top 5 vendors emerging Threat Hunting tools, but before that let us understand what threat hunting exactly refers to.
Threat Hunting?
- Threat hunting is a proactive approach to identifying adversaries rather than reactively waiti
- Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.
What is DNS (Domain Name System)?
- DNS (Do
- Before talking about the top 5 vendors providing DNS Security (Domain Name System Security), let us first fully understand what DNS Security does and if security is not implemented how can it be harmful.
What is DNS (Domain Name System)?
- DNS (Do
- Distributed denial-of-service (DDoS) attack is one in which a multiple sources attack a single target causing denial of service for legitimate users of the targeted system. The flood of incoming traffic totally overwhelms the system, hence denying
- A privileged access management technology needs to accommodate for the special needs of privileged accounts to support access management and access-related compliance needs. This article provides you a list of top Privileged Access Management Ve
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)
- Description:
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …
- Created by: Biswajit Banerjee
- Tags: ciso, pen testing, red team, security leadership
The Insider Risk Summit (West)
- Description:
- Created by: pritha
- Tags: insider risk summit, monterey, california

