and (26)

Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue incr

Read more…

To understand the differences between terms like cyber security and information security is important because many banking regulatory bodies like Reserve bank of India, Hong Kong Monetary Authority, Monetary Authority of Singapore, etc. have asked ba

Read more…

This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC, this paper will outline the typical

Read more…

There are millions of pages on the internet however about 90% of the pages are not indexed by search engines like Google, Yahoo, Bing ..etc. Which means only a tiny portion of the internet is accessible through search engines or standard means. Deep

Read more…

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users, and practitioners to innovate, educate and discuss around the current security landscape.This blog enlists the top IT GRC ve

Read more…

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)