Over the past year, the IT security space has had numerous mainstream headlines. From the discovery of sophisticated toolkits with ominous names like Flame to cross-platform zero-day vulnerabilities, both consumers and corporations were inundated wit
All Posts (2226)
"The good guys need to be right all the time. The bad guys just need to be right once."
From recent Target shops in US being compromised with 40 million shopper's card details, last minute shoppers are well discouraged. So is action after being com
With the Internet’s pervasive reach into business, government, and private life, it is unsurprising that cybercrime and espionage not only continue to evolve, but that new techniques are quickly adopted.
Today the cyber threats are constantly changing
Breaches are daily.And we all know that every device is compromised, to what extent remains mystery!
The security experts believe that being ready for the battle can make the journey smoother. Learn the optimal plan to reduce the risks and know wha
These are some common topics when we talk about CISOs role in an organization
As per my view CISO position is making a comeback, but if not placed right…… it can be just a position in any organization. I believe CISO should directly report to either t
The last fortnight has been like real busy @CISO Platform Annual Summit, 2013. But taking into consideration the brainstorming sessions,the brimming CISOs, the altogether wonderful experience, it all seems worth it! Nevertheless, there are always g
Overview on Cloud Security
Cloud adoption is an inevitable choice in today’s dynamic environment, yet many organizations are hesitant to fully leverage the benefits of the cloud, considering concerns regarding data loss and unauthorized access .
Tod
By ROHIT KACHROO, CISO, INDIABULLS tells about
Top steps during the implementation of a Privacy related project
Identification of information and other assets for protecting privacy is the first concern which any organization should address for
Denial-of-Service (DoS) attacks have existed since the early days of computing and have evolved into complex and overwhelming security challenges. Organizations have had to worry not just about DoS attacks, but Distributed DoS attacks (DDoS), and mor
http://www.cisoplatform.com/page/build-vs-buy-forrester-s-security-risk-practice-playbook
Why Read This Report
This report outlines a sourcing strategy and Forrester’s decision support solution for security and risk (S&R) executives working to build
Digital rights management solutions are for copyright protection of digital media.The function of DRM solutions is to prevent unauthorized redistribution of digital media post sale and restrict the ways in which consumers can copy content.
( Read mo
Top steps during the implementation of a Cloud Security project
As security is an important aspect of any project it is necessary to align security plan with business goals. There are a perspective series of steps that may be taken to secure the clou
Firstly the CISO has to work with the CIO and the business to understand the business need to implement this and then clearly articulate associated risk exposure to the firm and its stakeholders.
A detailed due diligence has to be completed following
Top technologies / solutions available for the Single Sign-On are :
1.Common Standard Solutions:
- The Generic Security Service Application Program Interface GSS-API.
- OSF Distributed Computing Environment DCE.
- Pluggable Authentication Modules PAM
2.
ISO 27001 certification in brief
- ISO 27001 formally specifies a management system that is intended to bring information security under explicit management control.
- Being a formal specification means that it mandates specific requirements.
- Organizati
Requirement for solutions related to Database security
A CISO should define the requirement for solutions related to Database security by first understanding the business and threat environment and decide on the most applicable threats and security p
Top steps during the implementation of a project related to Database Security
1.As most of the times, application developers or persons implementing the applications also work as database administrators, it is important that database administration i
Top technologies / solutions available for Database Security include the following:
- Encryption controls.
- Integrity controls.
- Data Leakage Prevention (DLP) solutions
- Access Controls
- Auditing Controls
- Backup Solutions.
(Read more: BYOD Security: Fr
Top technologies / solutions available for Application Security
Applications can be broadly classified into three categories viz. Thick client applications (Client/Server), Web Applications (Access over Internet or Intranet) and Mobile Applications.
Top steps during the implementation of a project related to Anti Spam Security
- Incorporation of spam detectors to block malicious/ fraudulent e-mails
- Installation of filters for automatic detection/ deletion of malicious software
- Deployment of softw
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)