Now this is a very subjective term as “Right” to each is quite different. More so, the subject “Information Security” by itself is quite a dynamic and an evolving term. Here, any measure stick with constant attributes may not provide a true insight f
All Posts (2199)
The 2012 Cost of Data Breach Study conducted provides some valuable information about the average cost of an enterprise data breach. The study, released in March’13, also recognized that organizations with a chief information security officer (CISO)
Introduction
Since the early days of the internet, DDoS had been a favorite weapon of cyber-criminals. Recently there was news about the biggest DDoS attack in history targeted towards Spamhaus, an anti-spam group. The attacks reportedly peaked at 300
Here are the key best practices that organizations need to adopt for securing their Big Data.
1. Secure your computation code:
- Proper access control, code signing, auditing should be implemented to secure computation code.
- Implement a strategy to prote
Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
I have seen many blogs, articles and most of them stated as, CISO need the ability to adopt the business. The role of the CISO in any organisation is to protect the business and bring the operations under secured mode, under the policy defined, gover
If you start off blowing the whistle too quickly, too early on — and believe me, early in my career, I did — I didn't make any friends, didn't get any further with the program of work I was trying to do.
You are going to discover some very, very ugly
We heavily rely on references while taking a decision on adoption of a new technology or a product. However, there is no dedicated analysis of product leadership purely based on customer recommendation. From CISO Platform technology Analyst team, w
On 2nd July 2013, National Cyber Security Poilicy has been released. First point in the preamble is an eye opener. It says " Cyberspace is a complex environment consisting of interactions between people, software and services supported by worldwide d
WHY APPSEC (APPLICATION SECURITY) WON’T ALWAYS BAIL YOU OUT OF APPLICATION BASED RISKS?
It is very typical of organizations to perform Web Application (WebApp) Security Assessments before the go-live of newer applications or periodic assessments of th
Regardless of how safe and secure any organisation may think its IT infrastructure is, they realize that they are still not immune to information security threats. In addition to deploying the right tools and technology, organisations globally needs
As the organizations are growing in size,workforce is also becoming increasingly mobile. Employees are using mobile devices like smart phones, tablets and laptops to connect andaccess work related data. Enterprises are highly shifting to tablets from
A generic definition of a crime would be an act that is in violation of the applicable laws. A crime / criminal offense may essentially hurt an individual or the community (city or a nation) at large. This concept has now been taken to the next level
IT Trends and challenges:
World is becoming Instrumental, Interconnected and Intelligent. IT security teams in enterprises are faced with rapidly mutating threats at every possible point of entry. This is fuelled by the fast evolution of threat landsc
Today enterprises live in a world where natural or man made disasters can crumble a business to its knees. It is therefore critically important for these enterprises to recognise the fact that disasters are real and happen and it is essential they ha
We all face difficulties in expressing our thoughts. Here are a few pointers which will help a person to write great articles in just 30 mins.
Step 1: Define the headline
When you write the articles ask yourself 3 questions:
- Are you saying something
Summary:
Purpose: The purpose of this concept paper is to explain the requirement of a framework which is not only easy to interpret but also dynamic in understanding customer requirements when it comes to analyzing vendors. It also explains the
How important is your personal brand in professional success?
Nobody can deny that personal reputation is critical in the path of professional success. Definitely the most important factor is "who you are?" but it is equally important "how others per
It disappoints me to see the huge focus on technology Not a criticism of the site or the people posting but a reflection of the, misguided, view that information is "owned" by technology because they are the people providing the mechanisms to process
We use security products to secure our systems and our businesses. However, the very security products we use, can themselves have vulnerabilities which can leave us susceptible to attacks. We conducted a study recently to understand the vulnerabilit
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)