All Posts (1988)

Sort by

Workshop: CASB - Part 2

CASB Workshop Part 2 by Gaurav Bhatia:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers 

CASB Workshop Part 2 Video by Gaurav Bhati

Read more…
Views: 165
Comments: 0

The Forrester Wave: DDoS Guide, Q3 2015

Why Read This Report

In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them

Read more…
Views: 128
Comments: 0

Buyers Guide for Identity & Access Governance

This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the 

Read more…
Views: 132
Comments: 0

Now that we have covered PeopleSoft Architecture, it is time to continue with PeopleSoft security and describe some attack vectors against PeopleSoft system discovered by ERPScan researchers. The first one is an attack on back-end systems.

First, we s

Read more…

Workshop: CASB - Part 1

CASB Workshop Part 1 by Bikash Barai:

  • Technology Taxonomy For Cloud Security
  • Key Components of Cloud Security Architecture
  • Blue Print To Build Your Cloud Security Program
  • Basics of Cloud Security Access Brokers


 
CASB Workshop Part 1 Video by Bikash Barai:
Read more…
Views: 121
Comments: 0

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)