Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD policy – Bring Your Own Device) and gain ac
All Posts (2226)
SAP has released the monthly critical patch update for June 2015. This patch update closes a lot of vulnerabilities in SAP products. The most popular vulnerability is Missing Authorization Check. This month, three critical vulnerabilities found by ER
Imagine you are on a shopping website or on a travel booking website and you see a deal which is quite exciting and your try and book, either you login with your account on the website or if you proceed to pay it gives a pop up, “Oops” price just got
End point Protection Solution:
Managing the End point is one of the key areas where security to be built strongly. As this is the entry point, arresting at this level would help and make our network stable. So Data at rest (end storage), data durin
CISO Platform Launches India’s First Ever Study Of The Salary Of Cyber Security Professionals
New Delhi, Bangalore, India, June 4, 2015: CISO Platform, an online community for senior IT Security Professionals announces the official launch of its co
Key Highlights Of the Report
- Correlate device and account risk factors across online and mobile channels
- Stop account takeover attacks from mobile devices using stolen credentials
- Capture persistent device ID, geo-location and detailed device risk fact
Gaana.com, one of the popular music streaming service got hacked. It is reported that 10 million username, email addresses, MD5-encrypted password, date of births, and other personal information has been stolen.
It is reported by their CEO that the
Top Security Worskshops
IT GRC Workshop Session
- Key Components and Architecture for GRC
- How to Jumpstart your GRC program with freely available tools and content
- Overview of Free Tools that you can use today
- Complete Vendor and Technology Taxonom
SAP has released the monthly critical patch update for May 2015. This patch update closes a lot of vulnerabilities in SAP products, some of them belong in the SAP HANA security area. This month, three critical vulnerabilities found by ERPScan researc
The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and
Watch Video: (Webinar) "Beyond tools-Exploiting the application Logic"
( Read more: Checklist to Evaluate a DLP Provider )
What will you Learn ?
- Importance of Threat Modelling and Design Reviews
- Identifying Logical Vulnerabilities
- Case Studies of the log
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In a
A simple 4-step model to information security
- Maintaining & Monitoring IT resource/asset integrity
- Preparing & Limiting damage/loss in the course of attack
- Proper Access control/Authentication & Authorization
- Secure Data Communication
Top 10 ste
We had a long and nice week at RSA Conference 2015 in San Franciso. Some of you might have missed the event or missed some of the good talks even though you were there. so we have handpicked the best of RSA just for you.
Important Note:
- All presen
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
(Source-RSA 2015,USA)
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)