Top Steps During Implementation Of A Firewall Project
- Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying
Top Steps During Implementation Of A Firewall Project
Security is crucial for a society to flourish otherwise it is only a matter of time before society will succumb to its sad end or shrink to an unnoticeable size. Societies which exist in today's world have done two things exceptionally right in their
Top steps during the Implementation of a DRM project-Points to consider for the implementation of a project:
The IT GRC solution brings enterprise-wide processes(workflow, data repository, regulatory mapping etc.) onto a single platform with an objective of better control of data, its faster retrieval and processing to enable enhanced decision making and tr
Security budgets have long being suffering, though the scenario seems to be improving today. Annual Survey on Security Budget Analysis in which 331 companies have participated gives interesting insights into Security Budget Scenario.The data has been
IT industry has been hit by several revolutionary changes. No wonder it is considered as one of the most dynamic sectors, changing almost daily. Cloud computing is being noted as the 4th IT revolution after mainframe, PC and internet. It is also one
Information security has become one of the most important and challenging issues facing today's organizations. With use of technology and widespread connectedness to the environment, organizations increasingly have become exposed to numerous and vari
We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking (CPSMM), in which 331 companies have participated. The data has been collected through the survey conducted online as well as during
After Target, it's Michaels. While they diagnosed one case, bumpers have been coming all the way through Christmas. Retail chain is out of wits. It's like the accident count, where the actual count is never known, plenty devices are probably unaware
Accountability in Privacy Management
Today the privacy trends analyzed and issues that most of the organizations or service providers face across industries and geographies is one thing noticed as a common theme among the trends that have emerged is A
Like so many other things in today’s world, cyber attacks along with those who perpetrate them are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applicat
We know all too well how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastruc
We are happy to announce the 4th Edition of our Top 100 CISO Awards. The award was conceptualized in 2010 to celebrate the success of the Chief Information Security Officers. TOP 100 CISO Awards is held every year to honor the success of the unsung h
The network security industry recommends that an organization periodically perform risk modeling,assessment, and risk management to anticipate and take pro-active measures against threats.
(Read more: Top 5 Application Security Technology Trends )
Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated wit
"The good guys need to be right all the time. The bad guys just need to be right once."
From recent Target shops in US being compromised with 40 million shopper's card details, last minute shoppers are well discouraged. So is action after being com
With the Internet’s pervasive reach into business, government, and private life, it is unsurprising that cybercrime and espionage not only continue to evolve, but that new techniques are quickly adopted.
Today the cyber threats are constantly changing
Breaches are daily.And we all know that every device is compromised, to what extent remains mystery!
The security experts believe that being ready for the battle can make the journey smoother. Learn the optimal plan to reduce the risks and know wha
These are some common topics when we talk about CISOs role in an organization
As per my view CISO position is making a comeback, but if not placed right…… it can be just a position in any organization. I believe CISO should directly report to either t
The last fortnight has been like real busy @CISO Platform Annual Summit, 2013. But taking into consideration the brainstorming sessions,the brimming CISOs, the altogether wonderful experience, it all seems worth it! Nevertheless, there are always g
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…