All Posts (2678)

Sort by

Can small hospitals pave the way to smart outcomes for larger hospitals…and can working together benefit both organizations and improve quality and patient outcome?

In today's reality of cost reduction, increased regulatory requirements, new technolog

Read more…

Security Technology Marathon (Rise/Fall)

As we see more and more businesses are becoming internet enabled with basic security mechanism in place. The year 2011 was one of the landmark years for high-profile cyber attacks. As the trend is said to continue in 2012 with more sophisticated and
Read more…
Views: 176
Comments: 0

Top Steps During Implementation Of A Firewall Project

  • Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying
Read more…

Emerging Case of Cyber Insurance

Security is crucial for a society to flourish otherwise it is only a matter of time before society will succumb to its sad end or shrink to an unnoticeable size. Societies which exist in today's world have done two things exceptionally right in their

Read more…
Views: 110
Comments: 1

Top steps during the Implementation of a DRM project-Points to consider for the implementation of a project:

  •  Ensure the security and document management with centralized storage. Design using open source architecture, as much as possible
  • Search of
Read more…

Security is not a practice, it’s a culture!

Information security has become one of the most important and challenging issues facing today's organizations. With use of technology and widespread connectedness to the environment, organizations increasingly have become exposed to numerous and vari

Read more…
Views: 110
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership