In the fast moving world of cyber security incident response, the challenge is to rapidly identify and stay ahead of the threat. Incident responders must move faster, be more agile, have longer stamina than the attacker. Additionally they must also b
All Posts (2221)
Overview
Internet of Things (IoT) has been gaining prominence in the consumer space in the last few years by redefining business-to-consumer (B2C) markets such as smart homes, media, infotainment, retail, financial services and so on. This IoT revolut
Overview
With millions of Bluetooth Low Energy (BLE) IoT devices deployed per year, comes the responsibility to secure them. BLE was designed for low power personal area networks. Security was not a focus while designing it. But nowadays, BLE devices
IoT security is being approached by many organizations and from different perspectives . In this post we give a birds eye view of the players.This is not intended to be comprehensive. We will supplement this in time with deeper dive at different la
Connected Cars
Connected vehicle technology potentially increases driving safety and efficiency through its ability to communicate with the internet and other automobiles
Consumer demands features range from Bluetooth, Wi-Fi, cellular network connecti
Two of the most talked about technologies in today's world are blockchain and IoT. They are at the initial stage of maturity and there are lot of activities taking place in development of them and finding interesting uses of the technologies. One of
This is a list of various use cases of IoT. Some of them have been detailed, because of current or potential challenges and usage trends.
1. Manufacturing
There are two types of systems: old systems with hardly any/nil instrumentation, and the relative
A typical architecture of an IoT solution consists of constrained devices, gateways or border routers and the cloud platform. On a high level architecture perspective there are two types of devices: constrained devices and gateway-like devices.
The g
This article gives a 5 principal steps and questions one must solicit the emergency from the cyber security incident response steps. This includes the incident, the control points, plan of action, communication, business impacts.
( Read More: Incide
Last year, cybercriminals attacked the California-based Hollywood Presbyterian Medical Center, encrypting files crucial in running the hospital’s operating systems and demanding a ransome to restore them to working order. The scam worked – after 10 d
The new Spora ransomware strain has now been dissected by more malware researchers and the team from G Data discovered that Spora uses an "innovative" way to spread itself via USB sticks. This strain is highly sophisticated and could become the "New
Ransomware is a type of malware that encrypts everything on your system with a cryptographic algorithm and holds that encrypted data hostage for ransom. It demands the user to pay for the decryption key. There are two types of ransomware. The first t
RSA conference is one of the leading security conferences worldwide with 700+ vendors at the Expo, which creates some unique challenges for security professionals. Some of the challenges @RSAC Expo are as below:
- Extremely difficult to identify the ven
The mobility explosion is the big bang that keeps expanding. It moved from stages like laptop, blackberry, touch based devices, tablets & more. The boundaries between working “in the office,” “on the road,” or “at home” have been blurred by the untet
Last Year was a great year for us at CISO Platform Community & we saw some great milestones hit.
Some of them are:
- 150+ Blogs
- 10+ Playbooks Created
- 25+ RFPs Created
- 10+ Events Organized
- 470+ Security Professionals As Attendees In Events
- 6+
The 2016 trends in cybersecurity report talks about the top 10 trends and stats that matter most to security and enterprise leaders. Its imperative to stay on top of security concerns in today's changing world.
What's in the Report?
- Study & Analys
There have been reports in media that the government of India has sounded an alert with all the top banks, and instructed them to inform about any breach in their IT systems within 120 minutes as the firewall against cyber hackers is strengthened in
CISO Platform 100, 2018 (India):
Applications for the Top 100 CISO Awards is open for 2018. Kindly fill in your responses asap.
We are very happy to announce that nominations are now open for the 7th Edition of Top 100 CISO Awards - India's 1st Securit
Speaker : Richard Bussiere, Principal Architect @ Tenable Network Security
Please Note - Speaker presentations represent the views of the in
Speaker : Arvind @ TiE
Please Note - Speaker presentations represent the views of the individual speakers and not of CISO Platform or their
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)