Short of resources, but still want to have a strong IT-security ecosystem? There are multiple tools in the market specially for small to medium enterprises who can use these open source tools. Although, they can't match the capabilities as provided b
best (4)
A Cloud Access Security Broker (CASB) is a solution to secure SaaS apps end-to-end, from cloud to device. Today, most CASBs focus only on software as a service (SaaS), although they can enforce best practices and security policies across all cloud se
This article was contributed by Sridhar Govardhan, CISA, CISM, CEH, General Manager-Cyber Security at Wipro
Phishing is a type of social engineering attack. Using phishing email, the attacker cleverly manipulates the natural human tendency to trust o
DEFCON 2018, 26th Def-Con Hacking Conference is much awaited event on Computer, Information Technology, Cyber Security, Software, Hacking topics.
Our editorial team has handpicked the best of the best talks at DEF CON 26 -is one of the world's large
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)