Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
vulnerabilities (6)
Intro
On 11th of May, a security headline broke out in the news, it was about an attack on USIS (U.S. Investigations Services) conducted potentially by Chinese state-sponsored hackers via a vulnerability in SAP Software. Hackers broke into third-party
We continue our series of posts giving a review of one of the most frequent vulnerability which affects a lot of SAP modules: cross-site scripting, or XSS. Today's post describes how to protect SAP NetWeaver ABAP from XSS.
From the developer’s perspec
Overview
With the increasing need of Bluetooth Low Energy (BLE) IoT security, comes the part of vulnerability management in these networks. Unlike the IP security, BLE security framework is not yet mature. The newer version of BLE have enhanced the s
There has been much discussion of "software liability," and whether new laws are needed to encourage or require safer software. My presentation will discuss how -- regardless of whether new laws are passed -- a tidal wave of litigation over defective
Background:
It has been suggested that any new development will include less than 1% original code. If this isn’t presently true, it will likely be as time progresses.
With any security program, the goal is to identify the vulnerabilities, the relate
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
Fireside Chat On Top Trends In Cybersecurity 2025 & Beyond
- Description:
We are hosting an exclusive Fireside Chat session on "Top Trends In Cybersecurity 2025 & Beyond" featuring Ravi Subbiah (CISO Consulting and Cybersecurity Delivery Leader at TCS) & Vijay Kumar Verma (SVP & Head Cyber Security Engineering at Jio).
The fast-paced evolution of cybersecurity is redefining priorities and pushing organizations to stay ahead of emerging challenges. This session offers a closer look at the… - Created by: Biswajit Banerjee
Best Of The World Talks With Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud)
- Description:
We are hosting an exclusive Best of the World Talks session on "Practical AI In Cybersecurity" featuring Anton Chuvakin (Security Advisor at Office of the CISO, Google Cloud) & David Randleman (Field CISO at FireCompass).…
- Created by: Biswajit Banerjee
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2024 at Bengaluru, Karanataka, India.
- Created by: Biswajit Banerjee