- Well if you are a tech enthusiast, you must have come across these words just like I have a lot of times! But I had never looked so deeply into finding out the differences as I thought deep web and darknet are the same, but it’s not. So, let’s under
All Posts (2468)
What is Blockchain?
- Conventionally, we had a habit of maintaining everything in a centralized repository and safeguarding it by applying perimeter security. Blockchain is a current breakthrough technology which eliminates centralized concept and sho
- Bitcoins are one of the most popular cryptocurrency which is growing rapidly for one of its unique feature where Nobody controls the transactions physically.
Prologue
- It was on November 8, 2016 when the Prime Minister Narendra Modi broke the n
Equifax Breach Postmortem: Top Mistakes Enterprises Should Avoid
- Equifax hack needs no introduction. One third of American lost their social security number due to this single breach. Here’s some of the top mistakes/learning from Equifax breach from
IT-GRC solutions allows organizations to effectively manage IT and Security risks while reducing the cost and complexity of compliance. IT and Security GRC management solution are focused on leveraging near-real time information on IT and Security as
Myth: – DLP is for IT and it is an IT Project | Truth: – DLP is for Business and it is a Business Project
DLP Solution is implemented by IT for the business with the close association of various business departments; DLP implementation requires st
WAF is specialized firewall designed to protect web applications (HTTP applications) from attacks such as cross-site scripting (XSS), SQL injection and other vulnerabilities that may exist. A WAF is able to detect and prevent unknown attacks by insp
The term Security Information and Event Management (SIEM) finds its origin from the combination of Security Information Management (SIM) and Security Event Management (SEM). Where SIM focuses on the collection and long-term storage of log files, SEM
- Vulnerability assessment is a process that defines, identifies, and classifies the security holes in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasure
- We are happy to announce the results of the annual survey of Security Buying Priority in which 350+ Companies have participated in the enterprise segment. This is a study of the key findings on the buying of various security technologies. Also,
Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and respond to
RSA Conference is one of the leading security conference worldwide. It creates tremendous opportunity for Enterprise mobility management vendors, users, and practitioners to innovate, educate and discuss around the current security landscape.
Enterp
Here are some Tips To Evaluate Your Readiness Before Implementing Data Loss Prevention (DLP) Solution:
Your organization have developed appropriate policy to govern the use of Data Loss Prevention (DLP) solution
To draw true value from any DLP deploym
A Next-Generation Firewall (NGFW) is an integrated network platform that combines a traditional firewall with application specific granular controls to help them detect application specific attacks. They help detect attacks through application specif
- A privileged access management technology needs to accommodate for the special needs of privileged accounts to support access management and access-related compliance needs. This article provides you a list of top Privileged Access Management Ve
A Next-Generation Firewall (NGFW) is an integrated network platform that combines a traditional firewall with application specific granular controls to help them detect application specific attacks. They help detect attacks through application specif
Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect a
User Behavior Analytics (UBA) solutions are the applications of advancements in Data science and Machine learning to tackle the current challenges in cyber security. UBA solutions captures data from myriad of sources both in structured and un-structu
These days, Printer is not the box in the corner of the office, which is harmless and doesn’t need more attention than normal wear and tear repair. In this 21st century, Printers and Multifunction printers (MFPs) are most vulnerable to the cyberattac
Identity and Access Management is the practice of managing digital identities through-out their life-cycle, managing access rights to enterprise resources and auditing of user access rights, use/misuse of digital identities. The entire process is mos
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)
- Description:
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
- Created by: Biswajit Banerjee
- Tags: ciso, fireside chat
CISO Talk (Chennai Chapter) - AI Code Generation Risks: Balancing Innovation and Security
- Description:
We’re excited to invite you to an exclusive CISO Talk (Chennai Chapter) on “AI Code Generation Risks: Balancing Innovation and Security” featuring Ramkumar Dilli (Chief Information Officer, Myridius).
In this session, we’ll explore how security leaders can navigate the risks of AI-generated code, implement secure development guardrails, and strike the right balance between innovation and security. AI…
- Created by: Biswajit Banerjee
- Tags: ciso talk
CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025
- Description:
We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner.
This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…
- Created by: Biswajit Banerjee
- Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso
6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)
- Description:
Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.
Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.
Date : Sept 2025 - Oct 2025
Venue: Delhi, Mumbai, Bangalore, Pune,…
- Created by: Biswajit Banerjee