Log management is one of the primary requirements for building an enterprise class SOC. In security, Log analysis is often the first step in incident forensics. Operating systems such as windows, Unix, Linux and other network devices such as routers,
tools (3)
In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also b
Don’t boil the ocean. Start with that.
Before I dipped my toes into security I did a stint as an application administrator. I was responsible for managing system and application monitoring. More performance and capacity monitoring than anything but th
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Best Of The World Talks With Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud)
- Description:
We are hosting an exclusive Best of the World Talks session on "Practical AI In Cybersecurity" featuring Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud) & David Randleman (Field CISO at FireCompass).…
- Created by: Biswajit Banerjee
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
For more details and agenda: Click Here
Nominate Yourself (Last Date 25th Jan 2025):…
- Created by: Biswajit Banerjee