Software requirement arises out of a business need. Someone from the business sector feels that some critical business requirement can be met by building an application and shall provide some amount of automation and enhancement as compared to the ma
All Posts (2638)
With the Markets being somewhat sluggish, Licence Revenues heading Southwards and Software companies having a perplexing situation for generating proceeds, Licence Compliance Management Exercises have gathered critical mass as an “Engine of Revenue G
>>Download the Complimentary Forrester Report
Why Read This Report
Over the past decade, infrastructure and operations (I&O) teams have focused large amounts of resources on making their customer-facing websites blazingly fast because website expe
Today, DDoS attacks are one of the most prevalent cyberassaults in our constantly changing threat landscape. Bank of America, MasterCard, PayPal, Sony, Visa, and many more of the world’s largest companies have all been victims of DDoS attacks. These
As per our IT Security Audit report of Ernst and Young, We have to protect our network for misuse of the Internet and we required proper analyzer to analyze our network, they also guide us for the Implementation of BYOD policy in the company and Prot
When we started this project of Secure Wireless LAN implementation in our organization, the key considering while evaluation that the solution must be robust, stable and highly secured so as to avoid security hassles and wireless threats.
Most compan
E-Procurement Portal has been set up for providing state-of-the-art e-Procurement services in India to Govt. Departments, Public Sector Organisations and Large Private Sector Enterprises. This e-procurement portal comprehensively addresses almost eve
Agriculture Insurance Company of India Ltd. (AIC) provides crop insurance coverage to 2.4 crore farmers annually, 86% of whom belong to the small and marginal category. To balance the twin challenge of crop insurance business, viz. reaching the remot
I am highly excited to tell you the most exciting event and all the buzz of Annual Summit is back !
Further more I am more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks of
These days’ web applications are under siege. Commercially motivated Hackers, bots, and fraudsters are attacking around the clock, attempting to steal data, disrupt access, and commit fraud which today’s next generation firewall, IPS and other networ
FIFA world cup fever is on, filled with flying goals, penalty, corner shots and even bites marks. Not to mention it also teaches a lot of leadership lessons that helps connects and inspire your team. The topic of leadership from sports world is commo
The Data Leak Prevention Project was rolled out in Lanco Infratech Ltd
- To protect its proprietary assets and business data against any loss or leakage
- To meet regulatory requirements as per the segment of industry.
- To increase awareness amongst the
For many organizations the success or failure of IT initiatives is predicated on the selection of the appropriate technology vendor. Despite the critical nature of this process, many organizations underestimate the time and effort it takes to make a
PCI DSS – Stringent but Exhilarating to Implement (Project PCI DSS Implementation & Certification)
PCI DSS stand for Payment Card Industry Data Security Standard is a robust, comprehensive, technology driven, transparent, explicit standard to enhance
How to Say “NO”
Why did I say, “Yes” when I really wanted to say No? You ‘d probably be asking this question every time you agree to another task. Even though you do not have time or resources to do something but you commit to another one. For example
The most important question every CISO or CIO concerns about optimization and efficiency around process with minimal security incident (to make a close to zero). This often leads to comparison with peers on "How are we doing as an organization?”, “Wh
Customer in Dilemma with Current Business Trends around security-Every business runs on some basic trust. In today’s digital world, Compliance and standard are the enablers to achieve security along with optimized performance. Every service company
What I found interesting in this report, was the numbers on increasing DDOS attacks. Recent DOS & DDOS attacks on EverNote and Feedly have left us thinking. EverNote once got to know how dependent we humans are on them. It was assumed that such traf
Did You Know Applications with Highest Malware Activity are in Unknown-UDP ?Tweet this ![]()
>>Click here to Download How Unknown UDP Hosts Most Malware
Analyzing Application Threat Landscape Today-
- 94% of all vulnerability exploit logs we observe
Fundamentally we associate branding with bragging ,thus embarrassment. Rather branding is what others think of you, a response to the stimulus you provide. Adityanath Jha(CEO Crayon Pictures, Former Global Head of Branding at infosys) shows a comp
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)
- Description:
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
- Created by: Biswajit Banerjee
Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)
- Description:
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…
- Created by: Biswajit Banerjee
- Tags: ciso, sandro bucchianeri, nab




