Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
are (3)
A typical architecture of an IoT solution consists of constrained devices, gateways or border routers and the cloud platform. On a high level architecture perspective there are two types of devices: constrained devices and gateway-like devices.
The g
Cyber Kill Chain Model
In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks
- Situational Awareness - Ability to identify what is happening in the networks and sys
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
For more details and agenda: Click Here
Nominate Yourself (Last Date 25th Jan 2025):…
- Created by: Biswajit Banerjee
CISO Platform: CISO 100 Awards & Future CISO Awards, USA 2025
- Description:
Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. We're reaching out to you because we believe you know someone deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !
For more details: Click Here
Nominate Yourself (Last Date 15th Feb 2025): …
- Created by: Biswajit Banerjee