Social Network For Security Executives: Help Make Right Cyber Security Decisions
Recommend an influencer whom we might have missed: We have chosen 82 and look forward to remaining 18 nominations. Now you can suggest us names with their contribution.----> Just reply to the…Continue
Anyone can share their experiences with DNIF and aujas as they are their partner for implementation (question posted on behalf of a CISO member) Continue
Concept Shifting the Security to Left.. to get views and is it practical? Also how and what tools & processes required for it to be successful ? (question posted on behalf of a CISO member) Continue
Anyone using Arcon, for Privilege Account/Access management? Wanted to get feedback? (question posted on behalf of a CISO member) Continue
We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 followers. Top 100 influencers are divided into 8 categories – CISO, Ethical Hackers, Innovator, Author, Appsec , Academia & Media/Analyst.
As a part of our CISO Platform 100 (Global)…Continue
Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purchasing DRP tools as net-new solutions for their organizations (as opposed to replacing an existing capability). They’re adding DRP to their existing security technology stacks to better tackle digital risk activities — namely, to improve…Continue
A report by Frost & Sullivan found that more than 80% of survey respondents admit to using non-approved applications in their jobs.If you don’t know what to protect, then you cannot protect.
Creating an asset inventory is the first step of any cyber security management function. However due rapid digitization, cloud adoption, IoT adoption and agile disperse teams, 3rd party integrations etc cyber…Continue
Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.
Advance threat protection is not about a single security solution, It is about a combination of security…