On 2nd July 2013, National Cyber Security Poilicy has been released. First point in the preamble is an eye opener. It says " Cyberspace is a complex environment consisting of interactions between people, software and services supported by worldwide d
to (10)
Top Steps During Implementation Of A Firewall Project
- Clearly defined requirements such as type of firewall, architecture, performance requirements, compliance requirement, sizing, reporting, and minimum specifications are important for identifying
Second critical category. Default passwords for access to the application
For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaw
Each application has several security settings that do not fit into any of the critical issues groups mentioned in our series of articles.Among such settings there are both standard settings (such as password length or the number of attempts given to
Everyone wants to know this today. One of the key attributes I have found in all the security people in last 14 years of my career is you need to be naturally skeptical when you look at stuff. This is one key aspect and if you don’t have this you wou
OAuth has become a highly influential protocol due to its swift and wide adoption in the industry. The initial objective of the protocol was specific: it serves the authorization needs for websites. However, the protocol has been significantly repurp
In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also b
Overview
With millions of Bluetooth Low Energy (BLE) IoT devices deployed per year, comes the responsibility to secure them. BLE was designed for low power personal area networks. Security was not a focus while designing it. But nowadays, BLE devices
There is a steep rise in interest from the Board & CEO of an organization to understand the security posture of their company. Partly because of the increasing pressure from the government regulators, stakeholders & discussions on the potential risk
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Presenting Security to Your Board and Managing Your Stakeholders, including industry stalwart like Vishwas Pitre [Zensar Technologies Ltd] (Moderator), Yogesh Kumar [Tata
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
- Description:
Speaker: Hilal Ahmad Lone, CISO at Razorpay.
Moderator: Manoj Kuruvanthody, CISO & DPO at Tredence Inc.
Topic: Evaluating AI Solutions in Cybersecurity: Understanding the "Real" vs. the "Hype"
Date: Nov 22, 2024 Friday
Time: 12:00 PM ISTKey…
- Created by: Biswajit Banerjee
- Tags: aisolutions