Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
testing (5)
Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendati
Formal Modeling and Automation is one of the things I love. I try to model everything and sometimes modeling helps and sometime it lands me in trouble. It helped me when I tried to model Penetration Testing and worked with my co-founder to design our
If you’re thinking that the industry you’re operating in is safe from cybersecurity threats then you might have to think again. In this article, we’ll specifically discuss the implications of breaches on healthcare businesses and why is annual penetr
It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the customer base for the organizations. However, this
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Webinar On Zero Trust : Architecture Principles; Threats; Architecture Components; Guidance Documents - NIST, CISA, NSA, DOD
- Description:
Register Here : https://info.cisoplatform.com/zero-trust-architecture-principles-threats-architecture-components-guidance-documents-nist-cisa-nsa-dod
Key Pointers:
- History of the zero trust model
- Zero trust architecture principles and tenets
- Zero trust threats
- Zero trust architecture…
- Created by: pritha
Webinar On SRE/DevOps Lesson For Your SOC
- Description:
Register Here : https://info.cisoplatform.com/sre/devops-lesson-for-your-soc
Key Pointers:
- How does the security analyst role evolve?
- How security processes change in an ASO SOC?
- How automation reduces toil (and what is toil, anyway)?
Register Here : …
- Created by: pritha
Webinar - Q1 Entire Cybersecurity Industry
- Description:
Register Here : https://info.cisoplatform.com/q1-entire-cybersecurity-industry
Key Discussion Pointers:
- Zero signs of industry consolidation
- Digital Mercantilism is driving the growth in number of vendors
- Still no solution to the SolarWinds problem
Register Here : …
- Created by: pritha
Webinar On Stories From The Web3 Battlefield: A Hacker's Point Of View
- Description:
Register Here : https://info.cisoplatform.com/stories-from-the-web3-battlefield-a-hackers-point-of-view
Key Pointers:
- Key web3 security incidents
- What went right
- What went wrong
- How to make sure that it doesn’t happen to you
Register Here : …
- Created by: pritha