Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
are (3)
A typical architecture of an IoT solution consists of constrained devices, gateways or border routers and the cloud platform. On a high level architecture perspective there are two types of devices: constrained devices and gateway-like devices.
The g
Cyber Kill Chain Model
In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks
- Situational Awareness - Ability to identify what is happening in the networks and sys
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
- Description:
Speaker: Hilal Ahmad Lone, CISO at Razorpay.
Moderator: Manoj Kuruvanthody, CISO & DPO at Tredence Inc.
Topic: Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
Date: Nov 22, 2024 Friday
Time: 12:00 PM ISTKey…
- Created by: Biswajit Banerjee
- Tags: aisolutions