Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
is (3)
What Is Bad USB?
The phenomenon of using the USB for malicious intent can be termed as Bad USB. USB Thumb Drives are the last considerations of malicious intent. However, if manipulated, they can takeover almost everything.
Some interesting demonstra
OAuth has become a highly influential protocol due to its swift and wide adoption in the industry. The initial objective of the protocol was specific: it serves the authorization needs for websites. However, the protocol has been significantly repurp
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Best Of The World Talks With Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud)
- Description:
We are hosting an exclusive Best of the World Talks session on "Practical AI In Cybersecurity" featuring Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud) & David Randleman (Field CISO at FireCompass).…
- Created by: Biswajit Banerjee
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
For more details and agenda: Click Here
Nominate Yourself (Last Date 25th Jan 2025):…
- Created by: Biswajit Banerjee