All Posts (2678)

Sort by

Alexander Blog backup part 2

SAP Mobile Platform Security: Introduction

Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD

Read more…
Views: 8
Comments: 0

Words of advice-Incident Response Team

Setting up an Security Incident Response Team (SIRT) is a challenging job.

Things To Keep In Mind:

1.Organization's IT assets and required security measures

2.Log of earlier attacks gives an idea on vulnerable assets and attacks areas

3.Organization'

Read more…
Views: 23
Comments: 0

(backup only)Alexander blog backups-

Guideline for Secure Configuring SAP NetWeaver ABAP

With this article we are starting a new series of guidelines describing some basic assessment procedures one can carry out on various business applications that would help security professionals to

Read more…
Views: 44
Comments: 0

The term ‘Cyber Domain’ has been used widely by various experts, sometimes interchangeably with ‘Cyber Space’, to imply – “the global domain within the information environment that encompasses the interdependent networks of information technology inf

Read more…

We are thrilled to have received so many wonderful ideas and suggestions during the breakfast series specifically focusing on CPI findings. Here are the quick highlights!

What was the objective of the Community Breakfast?

  • Preview of CPI Findings: T
Read more…

Incident Management Guide: Ways to categorize Incidents

Based on Type of Attack: 

  1. Malware : Malicious code has been successfully  logged into business infrastructure

  2. Unauthorized access (user/admin/other privilege escalations) : Any privilege escalations or access gained which should otherwise be denied
Read more…
Views: 26
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership