Like so many other things in today’s world, cyber attacks along with those who perpetrate them are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applicat
All Posts (1933)
We know all too well how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastruc
We are happy to announce the 4th Edition of our Top 100 CISO Awards. The award was conceptualized in 2010 to celebrate the success of the Chief Information Security Officers. TOP 100 CISO Awards is held every year to honor the success of the unsung h
The network security industry recommends that an organization periodically perform risk modeling,assessment, and risk management to anticipate and take pro-active measures against threats.
(Read more: Top 5 Application Security Technology Trends )
Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated wit
"The good guys need to be right all the time. The bad guys just need to be right once."
From recent Target shops in US being compromised with 40 million shopper's card details, last minute shoppers are well discouraged. So is action after being com
With the Internet’s pervasive reach into business, government, and private life, it is unsurprising that cybercrime and espionage not only continue to evolve, but that new techniques are quickly adopted.
Today the cyber threats are constantly changing
Breaches are daily.And we all know that every device is compromised, to what extent remains mystery!
The security experts believe that being ready for the battle can make the journey smoother. Learn the optimal plan to reduce the risks and know wha
These are some common topics when we talk about CISOs role in an organization
As per my view CISO position is making a comeback, but if not placed right…… it can be just a position in any organization. I believe CISO should directly report to either t
The last fortnight has been like real busy @CISO Platform Annual Summit, 2013. But taking into consideration the brainstorming sessions,the brimming CISOs, the altogether wonderful experience, it all seems worth it! Nevertheless, there are always g
Overview on Cloud Security
Cloud adoption is an inevitable choice in today’s dynamic environment, yet many organizations are hesitant to fully leverage the benefits of the cloud, considering concerns regarding data loss and unauthorized access .
Tod
By ROHIT KACHROO, CISO, INDIABULLS tells about
Top steps during the implementation of a Privacy related project
Identification of information and other assets for protecting privacy is the first concern which any organization should address for
Denial-of-Service (DoS) attacks have existed since the early days of computing and have evolved into complex and overwhelming security challenges. Organizations have had to worry not just about DoS attacks, but Distributed DoS attacks (DDoS), and mor
http://www.cisoplatform.com/page/build-vs-buy-forrester-s-security-risk-practice-playbook
Why Read This Report
This report outlines a sourcing strategy and Forrester’s decision support solution for security and risk (S&R) executives working to build
Digital rights management solutions are for copyright protection of digital media.The function of DRM solutions is to prevent unauthorized redistribution of digital media post sale and restrict the ways in which consumers can copy content.
( Read mo
Top steps during the implementation of a Cloud Security project
As security is an important aspect of any project it is necessary to align security plan with business goals. There are a perspective series of steps that may be taken to secure the clou
Firstly the CISO has to work with the CIO and the business to understand the business need to implement this and then clearly articulate associated risk exposure to the firm and its stakeholders.
A detailed due diligence has to be completed following
Top technologies / solutions available for the Single Sign-On are :
1.Common Standard Solutions:
- The Generic Security Service Application Program Interface GSS-API.
- OSF Distributed Computing Environment DCE.
- Pluggable Authentication Modules PAM
2.
ISO 27001 certification in brief
- ISO 27001 formally specifies a management system that is intended to bring information security under explicit management control.
- Being a formal specification means that it mandates specific requirements.
- Organizati
Requirement for solutions related to Database security
A CISO should define the requirement for solutions related to Database security by first understanding the business and threat environment and decide on the most applicable threats and security p
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISOPlatform Breakfast Meetup @ San Francisco
- Description:
CISOPlatform is hosting Breakfast meetup @ San Francisco. Join us if you are interested.
Register Here : https://www.cisoplatform.com/profiles/blogs/meet-ciso-platform-at-rsa-conference-2024
- Created by: pritha
CISOPlatform Summit 2024
- Description:
CISOPlatform Summit: Stronger Together As A Community.
Join us on 30th May, Thursday, Shangri-La at Bangalore
Register Here : https://events.cisoplatform.com/cisoplatform-summit-2024
- Created by: pritha
SACON + AICON 2024
- Description:
(Train Your Team) Trainings From Past Blackhat/Defcon/Nullcon Trainers
Register Here : https://event.cisoplatform.com/sacon/
- Created by: pritha