Cloud computing has transformed every business across the globe, from basic tools to enterprise applications. The entire enterprise infrastructure is moving to the cloud. With accelerating adoption of cloud, organizations are increasing their attack
All Posts (2199)
This presentation will address all the relevant information about default security postures achieved by using the -aaS model. This session will be a unique opportunity to hear from Murray Goldschmidt, renowned DevSecOps expert, explaining the key ite
Breaches are at all time high. In this webinar learn the do's and don't of handling breach disclosure. Best practices of how to set up a bounty program . How to respond to responsible disclosures? Do's and Don'ts and learning from the industry.
Key
RBI & SEBI has recently notified the Banks and Stock Brokers/Depository Participants and published a cyber security framework to be deployed. Here is a consolidated learning compiled by us and you can also access the detailed frameworks from here
Now that we have examined the differences between traditional firewalls and the next generation firewalls (NGFW), let's look at five of the top NGFW solutions from Cisco, CheckPoint, Fortinet, WatchGuard and Dell (SonicWALL).
It is important to note t
We wanted to share an alert with all the community members
Yesterday HCL data Breach was made public by a security research organization which is now in news. We wanted to share some best practices on how to handle such situations
Dos & Don'ts On How T
In recent past there have been some major breaches and some key reasons responsible for the breach were Shadow IT, Leaked Credentials, 3rd Party/Vendor Risks. Major breaches happened, like American Express, Uber, Dropbox, Dunkin Donuts, British Airwa
Businesses and organizations are fielding more & more next-generation Information Security technologies to reduce their risks as businesses leverage cloud capabilities and from advanced persistent threats. Unfortunately, we see our customers falling
Threat Intelligence - It is the one word we all have heard various times recently. The subject has been under constant scrutiny for a while now, but do we understand it? Moreover, since it has been viewed very differently from different viewpoints of
BASIC GUIDE TO CESG - CAS(T)
BY: MANOJ VAKEKATTIL
ISO27001:2013LA,CISM,CCNA,MCITP,ITIL-V3 CERTIFIED
OVERVIEW
CESG Assured Services for Telecommunication –CAS(T)
CAS(T) is a certification scheme for clients providing telecommunication services . The sche
DevSecOps, or the blending of an enterprise’s applications development with systems operations teams with collaboration of security has become a trendy IT topic. The new operating model is often employed in conjunction with Agile software development
The RSAC Innovation Sandbox Contest brings out cybersecurity’s boldest new innovators who have made it their mission to minimize infosec risk. Each year, 10 finalists grab the spotlight for a three-minute pitch while demonstrating groundbreaking secu
Get free access to the presentations by Dr. Phil Polstra, Wayne Tufek, Madhu Akula, Anant Shrivastava, Shomiron Das Gupta, Wasim Halani, Sahir Hidayatullah, Sudarshan Pisupati & more. SACON is one of the largest Security Architecture Conferences in A
Secure your Gmail , Hotmail & Dropbox with 2-Factor Authentication
Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically your password and the another is security code time-ba
From The Hidden Internet : Lessons from the 12 Months of Monitoring
Speakers
Jitendra Chauhan, PR Architect, Firecompass
Detailed Presentation:
Scaling Appsec Program With Cyber Range
Speakers
ED Adams, CEO, Security Innovation
Satish Janardhanan, Head Of Application Security, Accenture
Detailed Presentation:
CISO Platform Annual Summit @Bangalore, last week saw over 150+ attendees for over 2 days making the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome keyno
State Of Automotive Security
Speaker
Niloy Ray, Deputy General Manager, Mercedes Benz Research & Development India Pvt Ltd
Detailed Presentation:
Making security an essential part of your IT operations requires a disciplined approach to the development process, and that begins with teaching developers security awareness. Developers need to understand security from their own point of view, so t
FREE AND OPEN SOURCE SOFTWARE (FOSS) EVALATION PARAMETERS
Parameters |
Description |
Community |
The driving force and main resource for open source project |
Release activity |
Status of development and progress activity |
Longevity |
Indication of stability and chance o |
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)