- Simple and Easy to adopt
- Minimalistic i.e. you cannot drop anything out of these steps to
All Posts (2151)
Is CISO responsible for secure cording or it should be handled by quality fuction.
White Hat Hackers
Hackers that use their skills for good are classified as white hat. These white hats often work as certified Ethical Hackers, hired by companies to test the integrity of their systems. Others, operate without compa
Some days back, when I was going through the record breaking statistics of Facebook and its social networking platform’s REST APIs, I found phrases like“People on Facebook install 20 million applications every day. More than 2.5 million websites ha
LinkedIn got hacked and we heard it. Techradar got hacked and we heard it once more. We all know it. But we don’t do it. We all know that we should have unique passwords for different websites but how do we remember hundreds of them. Here is somethi
The recent LinkedIn security breach wherein approximately 6.5M user account names and passwords were stolen and published online is not something new. Such incidents are quite common place. Though the exact cause of breach is not known we can definit
Author - Anil Upadhyay, DM - ITGS, ITSD, Gujarat Gas Limited
We have listed a Key Parameter are required for Security Incident and Event Management and The Framework was attached at the end.
Major Parameters To Consider :
Ability to identify non
Building an Android Scale Incident Response Process
Overview
With the increasing need of Bluetooth Low Energy (BLE) IoT security, comes the part of vulnerability management in these networks. Unlike the IP security, BLE security framework is not yet mature. The newer version of BLE have enhanced the s
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)