The Internet has plenty of crackers, known as "black hats", who work to exploit computer systems.You also have white hats. When hackers are hired by companies to do penetration testing, it's legal and known as white hats. In this section we profile
All Posts (2199)
Due to financial implications caused by several recent high-profile data leakage incidents,enterprises are facing increasing pressure for implementation of stringent norms pertaining to governance and compliance reporting. Today, adhering to governme
Data explosion and advent of big data are phenomena, which are a result of economic development of
nations and increase in digital footprint of organizations.With more and more devices getting connected to the core business enterprise network, in ord
One of the most important functionality which we do in our day to day work is Vendor Management,or should I say how to do it effectively. Here are a few tips which I would recommend and if needed you can add as well:
1.Always do a thorough check of th
Does anybody succesfully implemented any BYOD Security Policy in his/her organization? Can he / she share the implemented policy and methodology / techniques / technology and challenges he / she faced ?
Keeping current with the latest threat trends can improve the effectiveness of existing security solutions as it helps to identify and prioritize security gaps that may require new approaches and more innovative strategies.
Key Findings:
- Web Secur
Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers,"hired by companies to test the integrity of their systems. Others, operate without company permission b
Organizations across industry verticals shall adopt IAM as it has become the need of the hour.However IAM solution may not be able to address some of the requirements, due to limitations in the features it supports or lack of flexibility to customize
Saurabh Kaushik,Sr Manager Information Security, Lupin Pharma, talks to CISO Platform on the biggest drivers and barriers of IAM adoption and the top challenges a CISO/organization can face while adopting IAM.
How important is IAM? Why should organiz
We have developed the myth that technology can be an effective fortress – We can have security.
Traditional focus on:
- Better Firewalls
- Boundary Intrusion Detection
- Critical Offsite Capacity
- Compliance Certification
Myths:
- IT staff = security staff
- Complianc
Top 10 predictions for 2013 and beyond - Gartner
Gartner's top predictions for 2013 focus on opportunities, economic risks and innovations that will force CIOs to move to the next generation of business-driven solutions."The priorities of CEOs must
MIT got hacked.Anonymous defaced the MIT to protest against the case of “Aaron Swartz”.
Without getting into who really hacked or the “cause” behind the protest, I just wanted to dissect it as an interesting case of multi-stage attack which proves th
- You are the sole person responsible for your success or failure.
- There is no excuse for any failure. A failure is a failure. Accept it gracefully. Learn from your mistakes. It is real failure when you do not accept
- Simple and Easy to adopt
- Minimalistic i.e. you cannot drop anything out of these steps to
Is CISO responsible for secure cording or it should be handled by quality fuction.
White Hat Hackers
Hackers that use their skills for good are classified as white hat. These white hats often work as certified Ethical Hackers, hired by companies to test the integrity of their systems. Others, operate without compa
Some days back, when I was going through the record breaking statistics of Facebook and its social networking platform’s REST APIs, I found phrases like“People on Facebook install 20 million applications every day. More than 2.5 million websites ha
LinkedIn got hacked and we heard it. Techradar got hacked and we heard it once more. We all know it. But we don’t do it. We all know that we should have unique passwords for different websites but how do we remember hundreds of them. Here is somethi
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)