We are seeking 4-5 McAfee IDS Engineers with 3-5 year experience for British Telecom Gurgaon, please ask the candidates to email resumes at akashdeep.bhardwaj@BT.com
All Posts (2199)
The security information and event management (SIEM) market is defined by the customer's need to analyze event data in real time for the early detection of targeted attacks and data breaches, and to collect, store, investigate and report on log data
Here are some indicators which will help you detect a compromise :
- Identification of same email from public domain to significant number of users or C-level employees or high value targets; encrypted attachments, password protected and zipped and pr
Top Past Talks By Moshe Ferber
Frequent Speaker at DEFCON, Blackhat, RSAC APJ, Royal Society London
Renowned Cloud Security Expert
1. From Zero To Secure In 1 Minute (Securing IaaS)
Conference : DEFCON 23
For complete presentation/slide : Click Her
Enterprise mobility management suites connect mobile devices to enterprise workflows while supporting the perpetual growth in device numbers and types. Professionals responsible for mobile and endpoint strategies, must maintain focus on near- and lo
This article is a contribution by Chitranjan Kesari, AVP IT, Lodha Group for the information security community.
The need for flexibility, speed and information sharing means is mandatory to maintain a robust security arrangement that can protect th
This article was contributed by Sridhar Govardhan, CISA, CISM, CEH, General Manager-Cyber Security at Wipro
Phishing is a type of social engineering attack. Using phishing email, the attacker cleverly manipulates the natural human tendency to trust o
Below are a few free & open source software evaluation parameters:
Parameters | Description |
Community | The driving force and main resource for open source project |
Release Activity | Status of development and progress activity |
Longevity | Indication of stability and |
Everybody has logs and that means that everybody ultimately will have to deal with them—if only because many regulatory mandates prescribe that. In this guide, Dr. Anton Chuvakin will analyze the relationship between SIEM and log management, focusing
Deception is a very useful and effective tactic to detect and evade threats in many situations. The modern cybersecurity situation is one such example.
This book explains cybersecurity deception and technologies in six short chapters which includes:
Dr. Philip Polstra
Author of ‘Linux Forensic’, 'Windows Forensic', 'Hacking & Penetration Testing With Low Power Devices' | Frequent speaker at DEFCON, Blackhat, BSides, GrrCON, ShakaCON | Renowned forensic expert
About : Digital forensics professor
The project title for this task force is “Reference security architecture for Mobility”. Some of the key things that you are going to learn from this presentation is:
- The reader will learn about the current aspects of mobility, its use cases, control
It is important to understand the new trends that are occurring amongst cyber security experts to make sure you properly protect your organization. The following are some key trends that you need to be aware of.
1) Data Co-relation Before adding more
The project title for this task force is “Cyber Security Maturity Model for Organizations”. Some of the key things that you are going to learn from this presentation is:
- The user organizations will learn, how to easily adapt a cyber security maturity
Cyber Kill Chain Model
In military strategy, a 'Kill Chain' is a phase model to describe the stages of an attack, which also helps inform ways to prevent attacks
- Situational Awareness - Ability to identify what is happening in the networks and sys
This article highlights the Threat Management Process in Incident Response and brings in the understanding of the Kill chain model. Excerpts have been taken from a session presented at SACON - The Security Architecture Conference. You can view the fu
Article submitted by Suryanarayanan K, ,Central Bank Of India
Phishing attacks are one of the most common security challenges that both individuals and organizations face in keeping their information secure. Phishing is the attempt to obtain sensit
Announcing Pre-registrations for the 4th edition of SACON - Security Architecture Conference in Bangalore on 10-11 November 2017.
Agenda Highlights: SACON 2017 aims to give an Overview of the Cyber Security Landscape, Emerging Security Technologies
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Offensive Security: Breach Stories to Defense Using Offense
- Description:
Speaker: Saravanakumar Ramaiah, Director - Technology Risk Management at Sutherland
Moderator: Rajiv Nandwani, Global Information Security Director at BCG.
Topic: Offensive Security: Breach Stories to Defense Using Offense… - Created by: Biswajit Banerjee