"The good guys need to be right all the time. The bad guys just need to be right once."
From recent Target shops in US being compromised with 40 million shopper's card details, last minute shoppers are well discouraged. So is action after being com
"The good guys need to be right all the time. The bad guys just need to be right once."
From recent Target shops in US being compromised with 40 million shopper's card details, last minute shoppers are well discouraged. So is action after being com
We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking (CPSMM), in which 331 companies have participated. The data has been collected through the survey conducted online as well as during
Top Steps During Implementation Of A Firewall Project
PCI DSS – Stringent but Exhilarating to Implement (Project PCI DSS Implementation & Certification)
PCI DSS stand for Payment Card Industry Data Security Standard is a robust, comprehensive, technology driven, transparent, explicit standard to enhance
These days’ web applications are under siege. Commercially motivated Hackers, bots, and fraudsters are attacking around the clock, attempting to steal data, disrupt access, and commit fraud which today’s next generation firewall, IPS and other networ
(Source: Defcon 22-Las Vegas)
(Source: Defcon 22-Las Vegas)
(Source: Defcon 22-Las Vegas)
(Source: Defcon 22-Las Vegas)
Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking, e-commerce, Manufacturing, Enterprise Applications, Gaming and so on
Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendati
From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar discussing the ha
Technical Skills:
Major Areas Of Focus:
( Read More: CISO Platform Top IT Security Influencers (Part 1) )
Conceptual (Understand How-It-Works):
Watch Talk:
(Read more: 5 Best Practices to secure your Big Data Implementation)
BadUSB — On accessories that turn evil by Karsten Nohl
Karsten Nohl is a cryptographer and security researcher
This talk introduces a new form of malware that oper
Second critical category. Default passwords for access to the application
For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaw
We are thrilled to have received so many wonderful ideas and suggestions during the breakfast series specifically focusing on CPI findings. Here are the quick highlights!
What was the objective of the Community Breakfast?
Intro
On 11th of May, a security headline broke out in the news, it was about an attack on USIS (U.S. Investigations Services) conducted potentially by Chinese state-sponsored hackers via a vulnerability in SAP Software. Hackers broke into third-party
CISO Breakfast Meet & Award Felicitation. We are glad to announce the city meet for Chennai on 6 September. We will also do an in-person award felicitation.
CISO Breakfast Meet & Award Felicitation. We are glad to announce the city meet for Mumbai on 14 September. We will also do an in-person award felicitation.