Social Network For Security Executives: Help Make Right Cyber Security Decisions
It is very important…
Blog Security Metrics and Dashboard for CEO 6 LikesAt a recent industry event discussing security, a question was rasised as to who needs to take ownership of security issues, the comment was made that it needs to be "someone senior enough to…
Blog How would you describe the CISO role on Twitt 1 Like Announcing CISO Handbook: A Call to AuthorsThere is a common misconception that cyber criminals and hacktivists only target large enterprises to reap a bumper. The reality is actually very different, recently published surveys…
Blog Tackling the Cyber Security challenges faced 3 LikesIs there anything common to Magic and Hacking? Is there a hacker in a magician? Is there a magician in a hacker?
In my personal journey, I adopted Magic first and later got acquainted with…
Blog Magic, Hacking and Kevin Mitnick 1 Like Interview Series: A CTO perspective on BIG DaJayantha Prabhu,CTO , Essar Group, talks to CISO Platform on the Top Security Trends that he feels, will define the…
Blog Interview Series: A CTO perspective on BIG Da 3 Likes One of the most important functionality which we do in our day to day work is Vendor…
Saurabh Kaushik,Sr Manager Information Security, Lupin Pharma, talks to CISO Platform on the biggest drivers and barriers of IAM adoption and the top…
We have developed the myth that technology can be an effective fortress – We can have security.…
Blog Changing Landscape of IT Security. How should 6 Likes Weekly Top 10 security news (4th-feb-10th-fe… Bit9 hacked, used to inject malware into customers' networks Security vendor Bit9 has been hit by a serious security breach of its own network.Intruders broke into a core part of the company… Page Weekly Top 10 security news (4th-feb-10th-fe… 1 Like Top 10 Security News-weeklyIs CISO responsible for secure cording or it should be handled by quality fuction.
Blog Is it CISO responsibility to take care of sec 8 Likes Business Logic Vulnerabilities-The Biggest C…MIT got hacked.Anonymous defaced the MIT to protest against the case of “Aaron Swartz”.
Without getting into who really hacked or the…
Blog How MIT website got hacked despite having any 4 LikesTop 10 predictions for 2013 and beyond - Gartner…
LinkedIn got hacked and we heard…
Blog How to have unique passwords for each website 9 Likes Java Zero Day with no patches: Quick fixes to# Manageengine Adaudit Plus -vs- Netwrix Auditor
# Rapid7 Nexpose -vs- Tenable Network Security Nessus
# Algosec Firewall Analyzer -vs- Tufin Orchestration Suite
# Hp Arcsight Siem Solutionarcsight Express -vs- Splunk Enterprise Splunk Cloud Splunk Light
# Cisco Meraki Mx Appliances -vs- Fortinet Fortigate
# Cloud Access Security Broker
# Distributed Denial of Service
# Network Advanced Threat Protection
© 2019 Created by CISO Platform.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service