Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:
- Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and fo
Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:
Cloud services, being cost effective, scalable and agile are growing at a slow but steady pace in India. For years enterprises and the security community have debated over its maturity and the readiness for its adoption . Major concerns such as secu
SAP has released the monthly critical patch update for February 2016. This patch update closes 23 vulnerabilities in SAP products including 15 SAP Security Patch Day Notes, 1 update to a previous Security Note, 2 Support Package Notes released on thi
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationa
Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.
( Read More: How To Benchmark A Web Application Security Scanner? )
More: Want to be a infosec community contributor? Click here
Identity and Access Management Workshop by Manjula Sridhar:
( Read More: 11 Ways To Measure The Effect
SAP has released the monthly critical patch update for January 2016. This patch update closes 23 vulnerabilities in SAP products (including ones closed after the second Tuesday of the previous month and before the second Tuesday of this month). Among
Wargame Strategy Simulation : Creating A Successful Evaluation & Implementation Checklist For IT GRC Solution Video by Ajay Agarwal,Nadir Bhalwani,Aditya Sarangapani,Sudarshan Singh.
( Read More: Using 80/20 Rule In Application Security Management )
(
Do you need a DLP? Here's a small list to check if your organization actually needs a DLP Solution:
Is Your Organization Thinking Of Adopting DLP? Here is a small checklist you may like to check to tick off before you start the adoption:
• Ability to discover sensitive data across all platforms:
A DLP solution should be able to discover sensitive data across applications, storage towers, systems and devices. It should have inbuilt rules to identify sensitive data as required by vario
Implementing DLP? Here's a quick overview of Top 5 Reasons for DLP Implementation Failures-
CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information security industry's in various ways. This list includes top researchers, industry experts, leading entrepreneurs, a must follow for infosec indu
Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours Video by Paul Raines, Pravesh Sharma, Shirish Dandekar, Sunil Mehta.
Wargame Strategy Simulation : Creating An Action Plan For Technology Evaluation For SOC/SIEM Implementation Vidoe by Sagar Karan, Avinanda Ghosh, Chitranjan Kesari, Robert H Klein, Sudeep Kumar Das, GB Shaik.
At BlackHat Europe, Alexander Polyakov, CTO at ERPScan, and Mathieu Geli delivered a presentation detailing security issues and misconfigurations affecting the oil and gas industry. In the interview, they highlighted particular vulnerabilities in SAP
SAP has released the monthly critical patch update for December 2015. This patch update closes 26 vulnerabilities in SAP products (19 Patch Day Security Notes and 7 Support Package Security notes), 16 of which are high priority. This month, two criti
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception
It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the C
Today we will show how SAP Afaria, an MDM solution from a world-famous software vendor, works and how cybercriminals can attack it in different ways.
In a nutshell, MDM is a set of services that help an administrator of a large company to control the