- The world of cyber security is moving so fast, that it is important to keep yourself updated with the newest technology. There are numerous articles, newsletters,reports etc claiming to provide authentic information, but which one to trust ?! Hence,
All Posts (2199)
- We have completed our selection of the final list of Top Indian Cyber Security Vendors to look out for in 2018 from all the vendors nationwide. Believe me this was not easy & we don’t claim this is exhaustive list as it probably will never be. But s
CyberSecurity Maturity of Indian Industries Show Grim Picture: Large Banks Score 61 & Online/FinTech Startups Score 8 (Out Of 100), As Per FireCompass Report
India, August 31, 2017 – FireCompass, a Cyber Security product company that specializes in
In Cyber Security Maturity Report of Indian Industry (2017), we’ve researched the current cybersecurity maturity of Indian industry based on the kind of technical security controls they have in place against modern day attacks.
Cyber security is now
The year of 2017 has been already marked with many historic big and bad data breaches. Lets look at the major cyber security breaches in the 2018 so far:
Aadhaar
- In January, correspondents with the Tribune News Service in India paid 500 rupees for l
- Recently, you might have heard in news about COSMOS Bank, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. The bank lost INR 940 million (94 Crores) due to this breach on 11th
- Lets have a look at the Cyber security Trends as well as attacks in 2018 so far:
1.AI-powered attacks
- In February, a study from teams at the University of Oxford and University of Cambridge warned that AI could be used as a tool to hack into drone
Security services of a network are often outsourced to an outside or third party service provider. Such an outsourced security service is called Managed Security Services (MSS) and the service provider provider is called Managed Security Service Prov
As I am digging deeper into the exciting world of “zero trust” (ZT), I’ve come across this fun blog series that my colleagues wrote about Google’s own journey to ZT.
Now, given that we experience BeyondCorp zero trust-style access every day at work, i
ENGAGING A SUB-PROCESSOR: INFORMATION AND AUTHORISATION REQUIREMENTS
Article 28(2) and (4) of the GDPR directly deal with the situation where a processor engages “another processor,” which can be called a “sub-processor” or a “level 2 processor”.
Under
Our Mission
Children are amongst the most vulnerable in the Cyber world and we believe It is time for us to do something for our next generation.
At CISO Platform community, we have taken on a mission to help the kids. We are creating "Kid's Cyber Sa
The Chennai security community got together for their November meet. Here's the session learnings and documents. Glad to see the Chennai chapter growing. Downloadable document links are given under header 'Documents from meeting'. Or Click Here To Go
OSINT%20Presentation%20Nov%202019.pdfOSINT%20Tools.pdf
Open Source Intelligence - Overview and few examples (Github and in Google groups/sites) how to identify sensitive/confidential information posted in public internet. I have also attached the Top
There are a variety of test case management tools out there, each with different capabilities and capacities. This market is not short of old standard tools that have been around since ages or the new ones offering a different level of sophistication
We created "CISO Platform 100" with the vision to recognise those who are making a difference to the world of security. Top 100 Influencers on an average have over 68170 followers on twitter in which some of the Top Influencers have over 3,81,304 fol
Digital Risk Protection ( DRP ) is a term possibly popularized or coined by Forrester to describe the market of tools and technologies to protect from the risks posed by externally facing digital assets. As per Forrester: “Most buyers (77%) are purch
A report by Frost & Sullivan found that more than 80% of survey respondents admit to using non-approved applications in their jobs.If you don’t know what to protect, then you cannot protect.
Creating an asset inventory is the first step of any cyber
Security breaches continue to make headlines as more and more data is being compromised each day. With no end in sight, this threat is growing at a fast rate. Here are some statistics about data breaches in recent times:
- Data breaches since 2013: 14.7
Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect a
An emerging technology, Endpoint Detection and Response (EDR) constitutes a set of tools and solutions that enterprises use to detect, investigate and mitigate suspicious activities on hosts and endpoints. The term was originally called as Endpoint T
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)