All Posts (1966)
“Combining the Physical world to the virtual world by connecting the sensors, sensors will be everywhere”.
Organizations are hopeful that companies will eventually allow consumers to buy products based on their personal preferences, not just dependi
How should CISO define the requirement for solutions related to the Firewall domain?
- To ascertain total throughput required. The requirement be finalized keeping in view the current traffic as well as expected increase in volumes over at least nex
Top Steps During Implementation Of A Firewall Project
- Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying
Security is crucial for a society to flourish otherwise it is only a matter of time before society will succumb to its sad end or shrink to an unnoticeable size. Societies which exist in today's world have done two things exceptionally right in their
Top steps during the Implementation of a DRM project-Points to consider for the implementation of a project:
- Ensure the security and document management with centralized storage. Design using open source architecture, as much as possible
- Search of
The IT GRC solution brings enterprise-wide processes(workflow, data repository, regulatory mapping etc.) onto a single platform with an objective of better control of data, its faster retrieval and processing to enable enhanced decision making and tr
Security budgets have long being suffering, though the scenario seems to be improving today. Annual Survey on Security Budget Analysis in which 331 companies have participated gives interesting insights into Security Budget Scenario.The data has been
IT industry has been hit by several revolutionary changes. No wonder it is considered as one of the most dynamic sectors, changing almost daily. Cloud computing is being noted as the 4th IT revolution after mainframe, PC and internet. It is also one
Information security has become one of the most important and challenging issues facing today's organizations. With use of technology and widespread connectedness to the environment, organizations increasingly have become exposed to numerous and vari
We are happy to announce the results of the annual survey of Security Implementation Status and Industry Benchmarking (CPSMM), in which 331 companies have participated. The data has been collected through the survey conducted online as well as during
After Target, it's Michaels. While they diagnosed one case, bumpers have been coming all the way through Christmas. Retail chain is out of wits. It's like the accident count, where the actual count is never known, plenty devices are probably unaware
Accountability in Privacy Management
Today the privacy trends analyzed and issues that most of the organizations or service providers face across industries and geographies is one thing noticed as a common theme among the trends that have emerged is A
Like so many other things in today’s world, cyber attacks along with those who perpetrate them are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applicat
We know all too well how major security incidents can affect a company’s data, networks and corporate brand. We also know that sophisticated attacks, designed to gain continuous access to critical information or to cause damage in critical infrastruc
We are happy to announce the 4th Edition of our Top 100 CISO Awards. The award was conceptualized in 2010 to celebrate the success of the Chief Information Security Officers. TOP 100 CISO Awards is held every year to honor the success of the unsung h
The network security industry recommends that an organization periodically perform risk modeling,assessment, and risk management to anticipate and take pro-active measures against threats.
(Read more: Top 5 Application Security Technology Trends )
Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated wit
"The good guys need to be right all the time. The bad guys just need to be right once."
From recent Target shops in US being compromised with 40 million shopper's card details, last minute shoppers are well discouraged. So is action after being com
With the Internet’s pervasive reach into business, government, and private life, it is unsurprising that cybercrime and espionage not only continue to evolve, but that new techniques are quickly adopted.
Today the cyber threats are constantly changing
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISOPlatform Breakfast Meetup @ San Francisco
- Description:
CISOPlatform is hosting Breakfast meetup @ San Francisco. Join us if you are interested.
Register Here : https://www.cisoplatform.com/profiles/blogs/meet-ciso-platform-at-rsa-conference-2024
- Created by: pritha
CISOPlatform Summit 2024
- Description:
CISOPlatform Summit: Stronger Together As A Community.
Join us on 30th May, Thursday, Shangri-La at Bangalore
Register Here : https://events.cisoplatform.com/cisoplatform-summit-2024
- Created by: pritha
SACON + AICON 2024
- Description:
(Train Your Team) Trainings From Past Blackhat/Defcon/Nullcon Trainers
Register Here : https://event.cisoplatform.com/sacon/
- Created by: pritha