SAP has released the monthly critical patch update for December 2015. This patch update closes 26 vulnerabilities in SAP products (19 Patch Day Security Notes and 7 Support Package Security notes), 16 of which are high priority. This month, two criti
All Posts (2290)
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as an enabler, a direct driver of business continuity and bottom line growth. This shift in perception
It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the C
Today we will show how SAP Afaria, an MDM solution from a world-famous software vendor, works and how cybercriminals can attack it in different ways.
In a nutshell, MDM is a set of services that help an administrator of a large company to control the
SAP has released the monthly critical patch update for November 2015. This patch update closes 23 vulnerabilities in SAP products (15 Patch Day Security Notes and 8 Support Package Security notes), 13 of which are high priority, some of them belong t
CASB Workshop Part 2 by Gaurav Bhatia:
- Technology Taxonomy For Cloud Security
- Key Components of Cloud Security Architecture
- Blue Print To Build Your Cloud Security Program
- Basics of Cloud Security Access Brokers
CASB Workshop Part 2 Video by Gaurav Bhati
Why Read This Report
In Forrester’s 36-criteria evaluation of distributed denial of service (DDoS) services providers, we identified nine of the most significant companies — in a crowded field of competitors. We researched, analyzed, and scored them
Effectively combating cybercriminals requires understanding how they operate. How do they render endpoint protection solutions inoperable? What methods do they use to sidestep two- factor authentication? How do they trick device ID systems and behavi
SAP has released the monthly critical patch update for October 2015. This patch update closes 29 vulnerabilities in SAP products, 15 of which are high priority, some of them belong to the SAP HANA security area. The most common vulnerability is Missi
This buyer’s guide can help you find the right IAM solution for your organization—one that meets your unique needs for compliance, provisioning, access management and governance, along with the identity intelligence to stay ahead of threats from the
Keynote Turbo Talks
Protecting SCADA environments
Daniel Lakier, CTO & President at SeeGee Technologies
This talk will take you through the fundamentals followed by the advanced levels of SCADA. What is SCADA, Why do we need to care, What are the
The evolution of malware is garnering attention from security researchers and law enforcement, as the off-the-shelf banking Trojans known as Dyre and Dridex have now been linked to the theft of massive amounts of corporate and personal data.
DRIDEX or
Workshop Sessions
The changing world of SCADA and how to secure it
Daniel Lakier, CTO & President at SeeGee Technologies
This workshop session will take you through major questions like What is SCADA/PCD* and why is it so insecure ? Why should we
Threat Intelligence Workshop by Bikash Barai:
- Key Components (People,Process and Technology)
- Threat Intelligence Maturity Model
- Threat Collection & Analysis
- Integrating Actionable Intelligence
- Technology & Vendor Landscape
( Read More: Beyond Secure Softw
In the third part of the PeopleSoft Security series,we will describe on how to log-in any account and gain full access to the PeopleSoft system.
What is PeopleSoft SSO and how does it work?
Like many other enterprise business applications, PeopleSoft s
Now that we have covered PeopleSoft Architecture, it is time to continue with PeopleSoft security and describe some attack vectors against PeopleSoft system discovered by ERPScan researchers. The first one is an attack on back-end systems.
First, we s
The quickly evolving Internet of Things or call it Internet of Everything will leave us more vulnerable to the cyber criminals. Government agencies are not prepared to combat the upcoming threat of “Online Murder”. Sounds Strange!!.. but we are headi
SAP has released the monthly critical patch update for September 2015. This patch update closes 20 vulnerabilities and 5 updates in SAP products, 16 of which are high priority, some of them belong to the SAP HANA security area. The most common vulner
Webinar on "Defusing Cyber Threats Using Malware Intelligence" Video by Arun Lakhotia.
- How a Malware can be source of intelligence about the attacker
- How Large scale, automated malware analysis to extract intelligence is feasible
- How Malware intelligenc
CASB Workshop Part 1 by Bikash Barai:
- Technology Taxonomy For Cloud Security
- Key Components of Cloud Security Architecture
- Blue Print To Build Your Cloud Security Program
- Basics of Cloud Security Access Brokers
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)
16th CISO Platform Top 100 Awards, 2025
- Description:
16th CISO Platform, Top 100 Awards 2025Top 100 Awards is India's 1st & Oldest CISO Awards, happening on February 21st 2025 at Bengaluru, Karanataka, India.
For more details and agenda: Click Here
Nominate Yourself (Last Date 25th Jan 2025):…
- Created by: Biswajit Banerjee
CISO Platform: CISO 100 Awards & Future CISO Awards, USA 2025
- Description:
Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. We're reaching out to you because we believe you know someone deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !
For more details: Click Here
Nominate Yourself (Last Date 15th Feb 2025): …
- Created by: Biswajit Banerjee