All Posts (1933)

Sort by

Breached Inspite Of All The Efforts?What Next?

29aphg7.png

Like so many other things in today’s world, cyber attacks along with those who perpetrate them are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applicat

Read more…
Views: 583
Comments: 0

2012 Trend and Risk Report

Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated wit

Read more…
Views: 284
Comments: 0

Emerging Cyber Threats

With the Internet’s pervasive reach into business, government, and private life, it is unsurprising that cybercrime and espionage not only continue to evolve, but that new techniques are quickly adopted.

Today the cyber threats are constantly changing

Read more…

An Overview on Cloud Security

Overview on Cloud Security

Cloud adoption is an inevitable choice in today’s dynamic environment, yet many organizations are hesitant to fully leverage the benefits of the cloud, considering concerns regarding data loss and unauthorized access .

Tod

Read more…

Certification: ISO 27001

ISO 27001 certification in brief

  • ISO 27001 formally specifies a management system that is intended to bring information security under explicit management control.
  • Being a formal specification means that it mandates specific requirements.
  • Organizati
Read more…

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)