All Posts (2226)

Sort by

Top 5 Big Data Vulnerability Classes

bgoabk.jpgRecently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c

Read more…

CISO opinion in Global Round Table and Breakfast meet

Meet, meet and meet, the last few weeks all we've done is meet you and try to help you better. Your views shape us and those plenty views needed a To-Do List, which is right here. We are grateful for each of your contributions and hope to have more o

Read more…
Views: 19
Comments: 0

What Cisos Want

1.  How to do a better vendor evaluation?






  • Know both Success and failure stories.
  • A strong network among CISOs for sharing failure stories
  • A common checklist for vendor evaluation should be made once we are aware of the success and failure sto
Read more…
Views: 22
Comments: 0

14 Things to Consider While Defining a GRC Framework

Information Security function had to be aligned to Risk Management function to provide independence by separating Infosec Governance and Infosec operations responsibilities. Enhancement in the policy was focused on the wider and strategic modificatio

Read more…
Views: 194
Comments: 0


Defcon is the time when I have no business meetings and am quite disconnected with the world. A good time to immerse myself in my own thoughts. Last week during Defcon @ Las Vegas, I was thinking on how difficult it is build a secure system. We get

Read more…