How should CISO define the requirement for solutions related to the Firewall domain?
- To ascertain total throughput required. The requirement be finalized keeping in view the current traffic as well as expected increase in volumes over at least nex
How should CISO define the requirement for solutions related to the Firewall domain?
The next-generation firewall is well defined by Gartner as something new and enterprise-focused “incorporating full-stack inspection to support intrusion prevention, application-level inspection and granular policy control” .
Most network security ve
PCI DSS – Stringent but Exhilarating to Implement (Project PCI DSS Implementation & Certification)
PCI DSS stand for Payment Card Industry Data Security Standard is a robust, comprehensive, technology driven, transparent, explicit standard to enhance
For many organizations the success or failure of IT initiatives is predicated on the selection of the appropriate technology vendor. Despite the critical nature of this process, many organizations underestimate the time and effort it takes to make a
These days’ web applications are under siege. Commercially motivated Hackers, bots, and fraudsters are attacking around the clock, attempting to steal data, disrupt access, and commit fraud which today’s next generation firewall, IPS and other networ
Technical Skills:
Major Areas Of Focus:
( Read More: CISO Platform Top IT Security Influencers (Part 1) )
Conceptual (Understand How-It-Works):
From our experience of helping organizations in building their ‘Vulnerability Management’ program, we feel that one of the major challenge the security manager/management faces does not always know the reality on the grounds. Obviously the management
Why Is OSINT So Important ?
OSINT (Open-Source Intelligence) is intelligence collected from publicly available sources.
It is becoming a key resource for collecting threat intelligence even in enterprise space. A factor being that now we live in a ve
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Third Party Risk Management: Checklists, Frameworks & Tools, including industry stalwart like Sunil Varkey [HSBC] (Moderator), N D Kundu [Bank of Baroda], Jitendra Chauhan
Current Project Synopsis:
Vulnerability Management System was implemented as a practice within the Organization across the Global Business Unit (India, Middle East & Africa). The implementation included Vulnerability Assessment and Remediation. The assessment is made based
The network security industry recommends that an organization periodically perform risk modeling,assessment, and risk management to anticipate and take pro-active measures against threats.
(Read more: Top 5 Application Security Technology Trends )