Technology comes with a cost. The cost, one could never have imagined if not properly implemented. Enterprise Mobility Management (EMM) solution at place boosts the productivity, enhances mobile security, and provides easy access to corporate content
All Posts (2290)
Firewall in simple terms acts as a barrier to prevent unauthorized access or malicious traffic within a system or in a network. The rapid growth of new innovative technology and alongside with the massive growth of new security threat, the tradition
Identity Access Management (IAM) is a set of business policies, framework and processes which ensures the right person has access to the right asset/resources. Identity Access Management solutions can deliver intangible benefits that are revenue incr
- Tanium
- Headquarters: Emeryville, CA
- Founded: 2007
- Founder: Orion Hindawi, David Hindawi
- Funding: $302.31M
- Website: http://www.tanium.com/
- Description: Tanium Inc. provides security and management system solutions that allow enterprises and governmen
Below are Top 6 Reasons Why Data Loss Prevention/ Data Leakage Prvention (DLP) Fails:
- Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and fo
Cloud services, being cost effective, scalable and agile are growing at a slow but steady pace in India. For years enterprises and the security community have debated over its maturity and the readiness for its adoption . Major concerns such as secu
SAP has released the monthly critical patch update for February 2016. This patch update closes 23 vulnerabilities in SAP products including 15 SAP Security Patch Day Notes, 1 update to a previous Security Note, 2 Support Package Notes released on thi
For years, enterprises and the security community have debated whether the cloud is more secure or less secure than the datacenter. Always a strawman argument, now that debate becomes moot. The cloud is here to stay. And the job now is to operationa
Session on Practical Demo of Collecting Threat Intel Using OSINT Tools Video by Sachin Deodhar.
( Read More: How To Benchmark A Web Application Security Scanner? )
More: Want to be a infosec community contributor? Click here
Identity and Access Management Workshop by Manjula Sridhar:
- Introduction & Scope
- Taxonomy
- Global Trends for Roadmap
- Capability Maturity Models
- Vendor Selection Criteria
- Guide to Vendors in the Landscape
- CPI Findings
( Read More: 11 Ways To Measure The Effect
SAP has released the monthly critical patch update for January 2016. This patch update closes 23 vulnerabilities in SAP products (including ones closed after the second Tuesday of the previous month and before the second Tuesday of this month). Among
Wargame Strategy Simulation : Creating A Successful Evaluation & Implementation Checklist For IT GRC Solution Video by Ajay Agarwal,Nadir Bhalwani,Aditya Sarangapani,Sudarshan Singh.
( Read More: Using 80/20 Rule In Application Security Management )
(
Do you need a DLP? Here's a small list to check if your organization actually needs a DLP Solution:
- If your organization wants to protect itself against negative exposures and fines associated with data breaches?
- If your organization wants to comply
Is Your Organization Thinking Of Adopting DLP? Here is a small checklist you may like to check to tick off before you start the adoption:
- Your organization have developed appropriate policy to govern the use of DLP solution?
To draw true value from
• Ability to discover sensitive data across all platforms:
A DLP solution should be able to discover sensitive data across applications, storage towers, systems and devices. It should have inbuilt rules to identify sensitive data as required by vario
Implementing DLP? Here's a quick overview of Top 5 Reasons for DLP Implementation Failures-
- Ineffective data classification methods:
Failure to identify the right data to be protected. Undermining certain data can lead to the exposure of sensitive
CISO Platform recognizes World's Top 100 IT Security Influencers who have/are impacting the information security industry's in various ways. This list includes top researchers, industry experts, leading entrepreneurs, a must follow for infosec indu
Wargame Strategy Simulation : Creating Action Items For Responding To A Breach In First 24 Hours Video by Paul Raines, Pravesh Sharma, Shirish Dandekar, Sunil Mehta.
Wargame Strategy Simulation : Creating An Action Plan For Technology Evaluation For SOC/SIEM Implementation Vidoe by Sagar Karan, Avinanda Ghosh, Chitranjan Kesari, Robert H Klein, Sudeep Kumar Das, GB Shaik.
At BlackHat Europe, Alexander Polyakov, CTO at ERPScan, and Mathieu Geli delivered a presentation detailing security issues and misconfigurations affecting the oil and gas industry. In the interview, they highlighted particular vulnerabilities in SAP
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
For more details and agenda: Click Here
Nominate Yourself (Last Date 25th Jan 2025):…
- Created by: Biswajit Banerjee
CISO Platform: CISO 100 Awards & Future CISO Awards, USA 2025
- Description:
Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. We're reaching out to you because we believe you know someone deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !
For more details: Click Here
Nominate Yourself (Last Date 15th Feb 2025): …
- Created by: Biswajit Banerjee