Here is an interesting webinar on the 'Insecurities of Security Products'. More often we consider the security vulnerabilities in products apart from security products. It is ironic how a product devised to provide security can also make you more sus
All Posts (2226)
Watch Talk:
(Read more: 5 Best Practices to secure your Big Data Implementation)
BadUSB — On accessories that turn evil by Karsten Nohl
Karsten Nohl is a cryptographer and security researcher
This talk introduces a new form of malware that oper
Watch Video:
(Read more: Under the hood of Top 4 BYOD Security Technologies: Pros & Cons)
Ants and Elephants in the CISO's Office by Paul Rain
I will show how ISO 9001 and ISO 27001 can be used together to deliver business value and demonstrate
Contrary to the common man belief that 'Windows is very insecure', Microsoft has been very proactive in security. Apple iOS has a great deal of security too, it is described in its building from scratch in the iOS security document. Here are the few
First critical issue. Patch management flaws
In our previous articles we’ve already introduced you to the list of the 9 most important business application security critical issues. We’ve also had a chance to present to you the skeleton of our guideli
So you are breeched? Okay, cool off and get a hand on the most useful tools. Why? Because now all you need to do is find out what's out in the open and what not. Then you can decide how bad the breech is and also if you get good evidence, you have a
Team Modules/Organization-
- IR Management
- IR Core Team
- IR Secondary Team
- IR Communication Team
- Technical Assessment & Forensics Team
- Technical Support Team
- IR Support Team
(Read more: My Key Learning While Implementing Database Security)
Worki
From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar discussing the ha
A concise primer to Forensics for a beginner or a security expert- an insight into actual solution achieved through Forensics. The problem states a PGP message intercepted by an RAT and needs to be decrypted without the actual key? The process is br
Watch Video: (Webinar) OS Security & Latest Attack Vectors
(Read more: Top 5 Big Data Vulnerability Classes)
Quick Glimpse-
A fairly technical content, highlighting the major interesting hardware threats, main intentions behind attacks, the trust
(Read more: Checklist to Evaluate IT Project Vendors)
How to Embed Risk Assessment into your Project Workstream by Michael Calderin - Security Officer, Bupa Global Latin America
Position information security more strategically within your organiza
(Read more: Checklist to Evaluate A Cloud Based WAF Vendor)
A journey to protect POS by Nir Valtman Discoverer of Point-of-Sale Vulnerabilities
From Target to other retail chains were all about 'POS'. Point-Of-Sale vulnerability has been at its pe
(Read More: Top 6 'Cloud Security' talks from RSA Conference 2016 (USA))
The Notorious 9 in Cloud Security by Moshe Ferber.
Cloud Computing presents major opportunities and benefits for the organization worldwide. It is scalable, flexible and eff
(Read more: APT Secrets that Vendors Don't Tell)
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk at CISO Platform Annual Summit, will give background how the Heartbleed bug was found by Cod
Bitcoin Transaction Malleability, an Insight by Daniel Chechik.The bitcoin network vulnerability had disturbed the huge bitcoin network. Plenty trading websites like Silk Road,MTGox and more have been victim to "Bitcoin Transaction Malleability." Thi
Cyber Safety in Cars and Medical Devices by Beau Woods, creator of IOT Security Framework. We are adopting connecting, computerized technology faster than we are able to secure it. When this technology is integrated into life and safety systems, bits
This talk will cover the concept of mis-using the hardware (x86 translation lookaside buffer) to provide code hiding and how the evolution of the Intel x86 architecture has rendered previous techniques obsolete and new techniques to perform TLB-split
With this article we are starting a new series of guidelines describing some basic assessment procedures one can carry out on various business applications that would help security professionals to expand their ERP systems’ immunity to attacks.
As we
CISO Platform Annual Summit @ Mumbai, last week saw over 250+ attendees for over 2 days making the the spirit of knowledge sharing and learning a huge success in the Information Security Executives of India. Here are the highlights of the awesome key
Securing a cloud environment requires, and offers a new approach to security: holistic Security Intelligence. Many organizations have dozens of different point products to address security concerns. For example, they may have a firewall from one vend
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)