Delhi is the capital of India and is almost the northern center. It is easily commutable to various popular spots in India, specially the Himalayan Range, Pink City Jaipur, Thar desert and Historical sites like Taj Mahal,Red fort, Kutumb minar etc. H
All Posts (2717)
Second critical category. Default passwords for access to the application
For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaw
This is a great Man In the Browser Attack webinar(15 min), hosted by CISO Platform and briefly points out the Risks and also Recommends Some Fixes. It is presented by the CTO at Iviz. MiTB being particularly important for banking and finance Industry
This is a great Big Data webinar(15 min), hosted by CISO Platform and briefly points out the Security Challenges and also Recommends Some Fixes. It is presented by Head of Development at Iviz.
What will you learn:
- Key Insights on Existing Big Data
2014 has been a great year at CISO Platform. We had around 1500 new senior executives joining the platform and published 120 new articles on security. Here are some of the best ones from 2014.
Watch Video:
5 Real ways to destroy business by breaking SAP Applications
Do you know where all the critical data of your company is stored? Is it possible for attacker to commit sabotage or espionage against your company by breaking into just one
Here is an interesting webinar on the 'Insecurities of Security Products'. More often we consider the security vulnerabilities in products apart from security products. It is ironic how a product devised to provide security can also make you more sus
Watch Talk:
(Read more: 5 Best Practices to secure your Big Data Implementation)
BadUSB — On accessories that turn evil by Karsten Nohl
Karsten Nohl is a cryptographer and security researcher
This talk introduces a new form of malware that oper
Watch Video:
(Read more: Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)
Ants and Elephants in the CISO's Office by Paul Rain
I will show how ISO 9001 and ISO 27001 can be used together to deliver business value and demonstrate
Contrary to the common man belief that 'Windows is very insecure', Microsoft has been very proactive in security. Apple iOS has a great deal of security too, it is described in its building from scratch in the iOS security document. Here are the few
First critical issue. Patch management flaws
In our previous articles we’ve already introduced you to the list of the 9 most important business application security critical issues. We’ve also had a chance to present to you the skeleton of our guideli
So you are breeched? Okay, cool off and get a hand on the most useful tools. Why? Because now all you need to do is find out what's out in the open and what not. Then you can decide how bad the breech is and also if you get good evidence, you have a
Team Modules/Organization-
- IR Management
- IR Core Team
- IR Secondary Team
- IR Communication Team
- Technical Assessment & Forensics Team
- Technical Support Team
- IR Support Team
(Read more: My Key Learning While Implementing Database Security)
Worki
From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar discussing the ha
A concise primer to Forensics for a beginner or a security expert- an insight into actual solution achieved through Forensics. The problem states a PGP message intercepted by an RAT and needs to be decrypted without the actual key? The process is br
Watch Video: (Webinar) OS Security & Latest Attack Vectors
(Read more: Top 5 Big Data Vulnerability Classes)
Quick Glimpse-
A fairly technical content, highlighting the major interesting hardware threats, main intentions behind attacks, the trust
(Read more: Checklist to Evaluate IT Project Vendors)
How to Embed Risk Assessment into your Project Workstream by Michael Calderin - Security Officer, Bupa Global Latin America
Position information security more strategically within your organiza
(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)
A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities
From Target to other retail chains were all about 'POS'. Point-Of-Sale vulnerability has been at its pe
(Read More: Top 6 'Cloud Security' talks from RSA Conference 2016 (USA))
The Notorious 9 in Cloud Security by Moshe Ferber.
Cloud Computing presents major opportunities and benefits for the organization worldwide. It is scalable, flexible and eff
(Read more: APT Secrets that Vendors Don't Tell)
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk at CISO Platform Annual Summit, will give background how the Heartbleed bug was found by Cod
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)

