The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile d
All Posts (2199)
These are top 5 FREE tools you should consider while building your Enterprise Mobility Management:
Convertigo:
It is a privately held company recognized as a “pure player” in the enterprise Mobility market and the first software vendor to distribute i
As more people use mobile devices to work, what are the key elements of an Enterprise Mobility Management (EMM) solution that successfully allow content creation, editing, sharing, syncing and pushing to mobile devices?
>> Download the Complete Rep
2016 has been a great year for the CISO Platform Community and our vision to create tangible community goods. We wanted to thank all those who made valuable contributions to make this happen.
We have created more than 200+ checklist. Here are some o
Next Generation Firewalls that businesses use to protect data centers or their network perimeter also offer other important features.
One of the main ones is Ethernet-layer tagging. IT security professionals can tag data and assign relevant security p
For decades, enterprises have been depending on many security technologies to defend their network perimeters from variety of cyber attacks. Amongst those technologies, firewalls are a critical layer in perimeter defense. As cyber threat landscape ha
Next Generation Firewalls that businesses use to protect data centers or their network perimeter also offer other important features.
One of the main ones is Ethernet-layer tagging. IT security professionals can tag data and assign relevant security p
BugSec Group and Cynet (www.cynet.com/blog) discovered a severe vulnerability in Next Generation Firewalls. Head of Offensive Security Stas Volfus uncovered the vulnerability, code-named FireStorm, which allows an internal entity or malicious code to
1. Granular Application Control
This refers to the ability to do more than simply block a website or block an application from a website or an application server, but actually understand the application and block the functions within that application.
This article includes:
1. Defining RANSOMWARE as disaster
2. How do avoid getting infected by RANSOMWARE programs
3. How to deal with infection after it happened
4. Structure of backup and fast replication systems
5. Conclusion
It may be a real surprise fo
What is a Next Generation Firewall?
A Next Generation Firewall is a security device, evolution of a stateful firewall, that is application aware, capable to recognize and block applications according to specific patterns and fingerprints peculiar of t
The scary truth
It's one of the biggest fears for an IT department. You have anti-malware agents on your desktops, you have scanning engines for incoming email, you have IPS/IDS systems, and you have even locke
d the permissions down on your file share
Before you go all torches and pitchforks on me, hear me out.
I hated writing this article. Truly. My industry is, at its core, a service industry. Overwhelmingly I meet people who go into IT service, support and cybersecurity that have a real desire t
One is not exactly channeling Nostradamus to predict that ransomware attacks will hit Industrial Control Systems (ICS). The importance of a reliable, high integrity backup and ability to recover in an acceptable timeframe is the same for ICS and ente
Our editorial team has handpicked the best of the best articles from LinkedIn which contains the details about the trending Ransomware posts.
1) Ransomware - Practical view, mitigation and prevention tips
Author: Tal Eliyahu
This article tells about the
A big thank you to our CISO Platform IoT Security Task Force. They did a 6 hour blogathon and came up with very interesting articles for our community.
If you love it, don't forget to share it !
|
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Ninety-nine percent of the enterprise workforce currently uses mobile devices - smart phones and tablets - to perform their jobs today. And nearly 60 per
Faced with the risk of cyberattacks, the prospect of losing data and the potential for large fines, the private sector has turned to the insurance industry to protect against losses arising from all manner of information security incidents. Research
In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also b
Overview
Internet of Things (IoT) has been gaining prominence in the consumer space in the last few years by redefining business-to-consumer (B2C) markets such as smart homes, media, infotainment, retail, financial services and so on. This IoT revolut
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
CISO Platform Talks on Offensive Security: Breach Stories to Defense Using Offense
- Description:
Speaker: Saravanakumar Ramaiah, Director - Technology Risk Management at Sutherland
Moderator: Rajiv Nandwani, Global Information Security Director at BCG.
Topic: Offensive Security: Breach Stories to Defense Using Offense… - Created by: Biswajit Banerjee