This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.
The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect th
This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.
The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect th





This article was contributed by Sridhar Govardhan, CISA, CISM, CEH, General Manager-Cyber Security at Wipro
Phishing is a type of social engineering attack. Using phishing email, the attacker cleverly manipulates the natural human tendency to trust o
Below are a few free & open source software evaluation parameters:
| Parameters | Description |
| Community | The driving force and main resource for open source project |
| Release Activity | Status of development and progress activity |
| Longevity | Indication of stability and |
Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will analyze the relationship between SIEM and log management, focusing
Deception is a very useful and effective tactic to detect and evade threats in many situations. The modern cybersecurity situation is one such example.
This book explains cybersecurity deception and technologies in six short chapters which includes:
Dr. Philip Polstra
Author of ‘Linux Forensic’, 'Windows Forensic', 'Hacking & Penetration Testing With Low Power Devices' | Frequent speaker at DEFCON, Blackhat, BSides, GrrCON, ShakaCON | Renowned forensic expert
About : Digital forensics professor
The project title for this task force is “Reference security architecture for Mobility”. Some of the key things that you are going to learn from this presentation is:
It is important to understand the new trends that are occurring amongst cyber security experts to make sure you properly protect your organization. The following are some key trends that you need to be aware of.
1) Data Co-relation Before adding more
The project title for this task force is “Cyber Security Maturity Model for Organizations”. Some of the key things that you are going to learn from this presentation is:
Cyber Kill Chain Model
In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks
This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the fu
Article submitted by Suryanarayanan K, ,Central Bank Of India
Phishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensit
Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.
Agenda Highlights: SACON 2017 aims to give an Overview of the Cyber Security Landscape, Emerging Security Technologies
The Task Force initiative by CISO platform is a community initiative formed to voluntarily take up projects in information security domain and create deliverables for the larger community benefits. Usually, projects decided upon by the task-force mem
The Task Force initiative by CISO platform is a community initiative formed to voluntarily take up projects in information security domain and create deliverables for the larger community benefits. Usually, projects decided upon by the task-force mem
This gives a glimpse of Advanced Security Operations Centre (SOC) Features & Technical Capabilities. This document is not explicit, it assumes you have…
This was presented at SACON and speakers explain subjects in detail during sessions for de
This gives a glimpse of how 'Machine Learning & Analytics' can be used for Threat Detection. This document is not explicit, it assumes you have prior knowledge of the subject, therefore only pointers have been mentioned.
This was presented at SACON a
Components of Google BeyondCorp
Device & Hosts
The Atlanta Pen Test Chapter has officially begun and is now actively underway.
Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …