Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
are (3)
A typical architecture of an IoT solution consists of constrained devices, gateways or border routers and the cloud platform. On a high level architecture perspective there are two types of devices: constrained devices and gateway-like devices.
The g
Cyber Kill Chain Model
In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks
- Situational Awareness - Ability to identify what is happening in the networks and sys
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Webinar On SRE/DevOps Lesson For Your SOC
- Description:
Register Here : https://info.cisoplatform.com/sre/devops-lesson-for-your-soc
Key Pointers:
- How does the security analyst role evolve?
- How security processes change in an ASO SOC?
- How automation reduces toil (and what is toil, anyway)?
Register Here : …
- Created by: pritha
Webinar - Q1 Entire Cybersecurity Industry
- Description:
Register Here : https://info.cisoplatform.com/q1-entire-cybersecurity-industry
Key Discussion Pointers:
- Zero signs of industry consolidation
- Digital Mercantilism is driving the growth in number of vendors
- Still no solution to the SolarWinds problem
Register Here : …
- Created by: pritha
Webinar On Stories From The Web3 Battlefield: A Hacker's Point Of View
- Description:
Register Here : https://info.cisoplatform.com/stories-from-the-web3-battlefield-a-hackers-point-of-view
Key Pointers:
- Key web3 security incidents
- What went right
- What went wrong
- How to make sure that it doesn’t happen to you
Register Here : …
- Created by: pritha
Webinar On Creating Scalable, Sustainable, Cybersecurity For Any Size Organization
- Description:
Register Here : https://info.cisoplatform.com/creating-scalable-sustainable-cybersecurity-for-any-size-organization
Key Pointers:
- Describe the relationship between the cybersecurity and IT Operations
- Assess organizational cybersecurity, GRC & operational readiness
- Successfully communicated with the C-Suite and to the Board on the…
- Created by: pritha