All Posts (1929)

Sort by

 

Static Application Security Testing (SAST)

SAST or Static Application Security Testing is the process of testing the source code, binary or byte code of an application. In SAST you do not need a running system.

 

Pros

• SAST can pin point the code where

Read more…

Magic, Hacking and Kevin Mitnick

Is there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?

In my personal journey, I adopted Magic first and later got acquainted with Hacking when I met my co-founder and started working on a prod

Read more…

Compliance and Government Regulations

8669796452?profile=originalDue to financial implications caused by several recent high-profile data leakage incidents,enterprises are facing increasing pressure for implementation of stringent norms pertaining to governance and compliance reporting. Today, adhering to governme

Read more…
Views: 126
Comments: 0

Tips for Vendor Management

8669799257?profile=originalOne of the most important functionality which we do in our day to day work is Vendor Management,or should I say how to do it effectively. Here are a few tips which I would recommend and if needed you can add as well:

1.Always do a thorough check of th

Read more…
Views: 211
Comments: 2

BYOD Security

Does anybody succesfully implemented any BYOD Security Policy in his/her organization? Can he / she share the implemented policy and methodology / techniques / technology and challenges he / she faced ?

Read more…

Top Security Threats 2013

Keeping current with the latest threat trends can improve the effectiveness of existing security solutions as it helps to identify and prioritize security gaps that may require new approaches and more innovative strategies.

 

Key Findings:

  • Web Secur
Read more…
Views: 655
Comments: 0

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)