Social Network For Security Executives: Help Make Right Cyber Security Decisions
Anyone using Arcon, for Privilege Account/Access management? Wanted to get feedback? (question posted on behalf of a CISO member) Continue
Hello, has anybody tested Forescout solution to identify the complete repository of IT Inventory? How successful it is and what were your observations? (question posted on behalf of a CISO member) Continue
Hi, wish to know how some of you manage vendor security assurance. One model I observe as emerging is, having a common platform and avoiding redundant efforts. Some players like Helios, KY3P offer…Continue
For Disk and pendrive encryption we were using Winmagic since 2013. But the company in Asia operation going to close shortly. Can any body suggest an alternative more or less similar to the Winmagic…Continue
Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.
Advance threat protection is not about a single security solution, It is about a combination of security…
An emerging technology, Endpoint Detection and Response (EDR) constitutes a set of tools and solutions that enterprises use to detect, investigate and mitigate suspicious activities on hosts and endpoints. The term was originally called as Endpoint Threat Detection and Response (ETDR) but it is more popular as EDR.
Key Program Metrics:
Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and respond to any kind of cyber attacks. Threat intelligence as applied in conventional security is any information that helps you tune your security defenses, build an effective response program for any contingency and also if required take preemptive…Continue
A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization. Another reason to hire a security testing company is that one may find it difficult to hire and retain Penetration Testers.…Continue