Recently, we were pentesting a Data mining and Analytics company. The amount of data that they talked about is phenomenal and they are planning to move to Big Data. They invited me to write a blog on state of the art, Big Data security concerns and c
All Posts (2226)
Over the past decade, E-Commerce applications have grown both in terms of numbers and complexity. Currently, E-Commerce application are going forward becoming more personalized, more mobile friendly and rich in functionality. Complicated recommendati
Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking, e-commerce, Manufacturing, Enterprise Applications, Gaming and so on
The project scope is to perform a security assessment of the current environment of MBE including the major business processes, operating functions, organizational units and information systems and a thorough evaluation of the configuration and desig
To mitigate risk
- Prevent access breaches through privileged accounts
- Monitor activities carried out by privileged users
- Enforce accountability for use of generic privileged accounts
- Enforce granular access restrictions as
Turbo Talks
How the Heartbleed bug was found?
Antti Karjalainen discoverer of Heartbleed
The Heartbleed bug was a catastrophic vulnerability in widely used OpenSSL TLS implementation. This talk will give background how the Heartbleed bug was found
Meet, meet and meet, the last few weeks all we've done is meet you and try to help you better. Your views shape us and those plenty views needed a To-Do List, which is right here. We are grateful for each of your contributions and hope to have more o
- Know both Success and failure stories.
- A strong network among CISOs for sharing failure stories
- A common checklist for vendor evaluation should be made once we are aware of the success and failure sto
Why do we need a common security technology evaluation framework?
Floating an RFP (Request for Proposal) or evaluating a new technology for a CISO is a substantial effort. Going through the sea of data and marketing buzz to judge a vendor and its
Information Security function had to be aligned to Risk Management function to provide independence by separating Infosec Governance and Infosec operations responsibilities. Enhancement in the policy was focused on the wider and strategic modificatio
This is the second compilation of Best Of Defcon 22 at a glance. The following Links will link you to the respective complete PPT.
Important Note:
- All presentations are courtesy Defcon and is presented as-is without any modification
- Some of the des
Happy festive season to all our readers.
“BYOD adoption is much easier now, If "CISO / IT" Gets Its Way. It helps IT decision makers supporting BYOD to anticipate the day to minimise the device expenses of any organisation for its employees and secu
Defcon 22, the largest conference for hackers with 15,000 attendees saw some of the most interesting researches in the field of security and hacking. From hundreds of talks, we have handpicked the top presentations which are relevant for security man
asghsah
asah
Defcon is the time when I have no business meetings and am quite disconnected with the world. A good time to immerse myself in my own thoughts. Last week during Defcon @ Las Vegas, I was thinking on how difficult it is build a secure system. We get
ssdffdfd
POS
Traffic Control
Dropcam
Elevator
Pets
CISCO Phones
SDN
Hotel Room
Phone DDOS
Honeywell- No alarms
Google Nest
(Source: Defcon 22-Las Vegas)
(Source: Defcon 22-Las Vegas)
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)