All Posts (2018)

Sort by

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In a

Read more…
Views: 137
Comments: 0

Top 10 Mitigation steps in information security

A simple 4-step model to information security

  1. Maintaining & Monitoring IT resource/asset integrity 
  2. Preparing & Limiting damage/loss in the course of attack
  3. Proper Access control/Authentication & Authorization
  4. Secure Data Communication

Top 10 ste

Read more…
Views: 8
Comments: 0

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)