Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
what (3)
What Is Bad USB?
The phenomenon of using the USB for malicious intent can be termed as Bad USB. USB Thumb Drives are the last considerations of malicious intent. However, if manipulated, they can takeover almost everything.
Some interesting demonstra
A typical architecture of an IoT solution consists of constrained devices, gateways or border routers and the cloud platform. On a high level architecture perspective there are two types of devices: constrained devices and gateway-like devices.
The g
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Webinar On SRE/DevOps Lesson For Your SOC
- Description:
Register Here : https://info.cisoplatform.com/sre/devops-lesson-for-your-soc
Key Pointers:
- How does the security analyst role evolve?
- How security processes change in an ASO SOC?
- How automation reduces toil (and what is toil, anyway)?
Register Here : …
- Created by: pritha
Webinar - Q1 Entire Cybersecurity Industry
- Description:
Register Here : https://info.cisoplatform.com/q1-entire-cybersecurity-industry
Key Discussion Pointers:
- Zero signs of industry consolidation
- Digital Mercantilism is driving the growth in number of vendors
- Still no solution to the SolarWinds problem
Register Here : …
- Created by: pritha
Webinar On Stories From The Web3 Battlefield: A Hacker's Point Of View
- Description:
Register Here : https://info.cisoplatform.com/stories-from-the-web3-battlefield-a-hackers-point-of-view
Key Pointers:
- Key web3 security incidents
- What went right
- What went wrong
- How to make sure that it doesn’t happen to you
Register Here : …
- Created by: pritha
Webinar On Creating Scalable, Sustainable, Cybersecurity For Any Size Organization
- Description:
Register Here : https://info.cisoplatform.com/creating-scalable-sustainable-cybersecurity-for-any-size-organization
Key Pointers:
- Describe the relationship between the cybersecurity and IT Operations
- Assess organizational cybersecurity, GRC & operational readiness
- Successfully communicated with the C-Suite and to the Board on the…
- Created by: pritha