Category: Everyone’s Blog Posts – CISO Platform

How mature is your Application Security Program?

Read the original article: How mature is your Application Security Program? (Posted on Behalf of Pushkal Mishra AVP IT & CISO, HDFC ERGO Health Insurance Ltd) Business applications are vital for the successful functioning of any organization. Therefore, managing their information security…

Information Security and Risk Management as a business enabler

Read the original article: Information Security and Risk Management as a business enabler (Posted on Behalf of Michalis Kamprianis Developing Security Strategies at Suse) A common problem for information security professionals, is that security is perceived as a business blocker; hindering the…

Three approaches to cyber security budgeting

Read the original article: Three approaches to cyber security budgeting (Posted on Behalf of Michalis Kamprianis Developing Security Strategies at Suse) I often get into discussions about budgets and how much a company should invest in its security program. There is no easy answer because the…

Top 5 Information Security Reports

Read the original article: Top 5 Information Security Reports (Posted On Behalf of Pushkal Mishra ,AVP IT & CISO, HDFC ERGO Health Insurance Ltd) As a security professional we always wonder about new cyber threats and how the world is…

10 Areas of Change in Cybersecurity for 2020

Read the original article: 10 Areas of Change in Cybersecurity for 2020 Cybersecurity in 2020 will be evolutionary but not revolutionary.  Although there is always change and churn, much of the foundational drivers remain relatively stable.  Attacks in the next…

A Path To The New Normal

Read the original article: A Path To The New Normal Original Post by David Wain, National Practice Manager — Education at Data#3 Limited Australians have a history of coming together in times of…   Advertise on IT Security News. Read the original article:…

Maze Ransomware Attacks Cognizant

Read the original article: Maze Ransomware Attacks Cognizant A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position…

Maze Ransomware Attacks Cognizant

Read the original article: Maze Ransomware Attacks Cognizant A large enterprise cognizant has released a notification regarding the maze ransomware attack. The team is working on various aspects to contain the incident. However, this puts us in a shocking position…

Musings on Modern Data Security

Read the original article: Musings on Modern Data Security (this is cross-posted from Anton on Security) As I am expanding my responsibilities to cover some exciting …   Advertise on IT Security News. Read the original article: Musings on Modern Data Security

Data Security and Threat Models

Read the original article: Data Security and Threat Models (cross-posted from Anton on Security) This post is my admittedly imperfect attempt to “reconnect” data security…   Advertise on IT Security News. Read the original article: Data Security and Threat Models

[Webinar] Collaborated Cyber Defense in Pandemic Times

Read the original article: [Webinar] Collaborated Cyber Defense in Pandemic Times Key Discussion Points – – How cyber security teams should collaborate in pandemics – Your remote employees are now your 3rd parties. – Quickly achieve security by asking a…

Pivot to Telehealth Brings New Benefits and Risks

Read the original article: Pivot to Telehealth Brings New Benefits and Risks The Coronavirus pandemic is changing how people receive healthcare with a shift to more remote diagnosis options being rolled out as a first line of care.  The advantages…

Coming together with safe distance and Secure

Read the original article: Coming together with safe distance and Secure Trying times like these requires organization to put their best foot forward for the safety of their employees and to enable business continuity. Work from anywhere in view of…

Does Isolation Sacrifice Privacy?

Read the original article: Does Isolation Sacrifice Privacy? Would you cut & paste your intimate, private details onto Social Media for the world to see? No?…   Advertise on IT Security News. Read the original article: Does Isolation Sacrifice Privacy?

Work From Home Guidelines for Security (COVID19)

Read the original article: Work From Home Guidelines for Security (COVID19) I hope all of you are doing well. As you are aware that as response to Coronavirus Crisis many of us had to transition to work from home.   The bad…

Helping Academia Succeed So Cybersecurity Can Thrive

The future of technology is at risk as there are not enough skilled cybersecurity workers to fulfill the demands for keeping digital technology secure, private, and safe to use.  Some estimates predict there will be over 3 million unfilled positions…

Database Encryption

Details : We have implemented Database encryption known as Transparent Data encryption.it is most critical and native solution available by leading database companies. It is implemented at file level.It helps to solve the problems like saving the data during rest.…

Database Encryption

Details : We have implemented Database encryption known as Transparent Data encryption.it is most critical and native solution available by leading database companies. It is implemented at file level.It helps to solve the problems like saving the data during rest.…

[Panel Discussion] First 90 Days Plan After Joining As a CISO

At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of First 90 Days Plan After Joining As a CISO, including industry stalwart like Mansi Thapar [Jaquar Group] (Moderator),  Umesh Parshetye,  Amit Jaokar [NKGSB Bank], Sanil Anand Nadkarni [SLK] , Shitanshu…

COVID 19 : Lessons Learnt (11 March 2020)

I have been involved in response to COVID19 which took the world by surprise & during last 2 months, I did several things at unprecedented speed. I am putting together this article summarizing my lessons learnt & hope these will…

COVID 19 : Lessons Learnt (11 March 2020)

I have been involved in response to COVID19 which took the world by surprise & during last 2 months, I did several things at unprecedented speed. I am putting together this article summarizing my lessons learnt & hope these will…

CISO Platform Annual Summit, 2020 Highlights

We wanted to share with you some of the amazing moments from “Annual Summit, India 2020” @ Bangalore on 21 & 22 Feb. We had over 700+ attendees including CISO and SACON attendees sharing knowledge through Taskforce Presentations, Panel Discussions Round Tables, Workshops and more making…

(Free PPTs) Top Talks @ SACON – 2020 !

Get free access to the presentations by Gregory Pickett , Nandan Nilekani, Andrea Marcelli, James Stanger, Jim Hietala, Shivangi Nadkarni, Monojit Choudhury, Srinivas Poosarla & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 600+ participants, this was the 7th edition of SACON…

(Free PPTs) Top Talks @ SACON – 2020 !

Get free access to the presentations by Gregory Pickett , Nandan Nilekani, Andrea Marcelli, James Stanger, Jim Hietala, Shivangi Nadkarni, Monojit Choudhury, Srinivas Poosarla & more. SACON is one of the largest Security Architecture Conferences in APAC region. With over 600+ participants, this was the 7th edition of SACON…

CISO Platform Annual Summit, 2020 Highlights

We wanted to share with you some of the amazing moments from “Annual Summit, India 2020” @ Bangalore on 21 & 22 Feb. We had over 700+ attendees including CISO and SACON attendees sharing knowledge through Taskforce Presentations, Panel Discussions Round Tables, Workshops and more making…

There is No Easy Fix to AI Privacy Problems

Artificial intelligence – more specifically, the machine learning (ML) subset of AI – has a number of privacy problems. Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access…

More Challenges for Intel Hardware Product Security

New CPU Vulnerabilities Discovered RIDL/ZombieLoad and L1DES/CacheOut are just the latest variants of vulnerabilities discovered in Intel CPU’s that target Micro-architectural Data Sampling (MDS) weaknesses. Discovered over 7 months ago, researchers responsibly informed Intel, and kept the information…   Advertise…

Time to Check and Change Your Avast Privacy Settings

Vice magazine recently reported that the Avast anti-virus company was harvesting their customer’s browsing data and selling it to other companies.  This included what sites, keyword searches, YouTube videos, and other data which showcased…   Advertise on IT Security News.…

Privacy Day - Yes it Matters More than You Might Think

Privacy Day promotes the fundamental principles of being able to control your personal information and to raise awareness of the risks in our digital society. The advancement and adoption of communication technology have elevated this issue to a worldwide problem.  A…

Collaboration Makes Smart Cities More Secure

I am excited to join the development team for the U.S. National Institute of Standards and Technology (NIST) Smart Cities and Communities Framework (SCCF) with a focus on cybersecurity…   Advertise on IT Security News. Read the complete article: Collaboration…

2020 Report on State of Breach Protection by Cynet

Cynet today announced the State of Breach Protection 2020 Report. The report reveals significant concerns that security decision-makers need to look into immediately while designing their Breach Protection Plans for 2020. Cybersecurity is one of the major concerns stated in…

Collaboration Makes Smart Cities More Secure

I am excited to join the development team for the U.S. National Institute of Standards and Technology (NIST) Smart Cities and Communities Framework (SCCF) with a focus on cybersecurity…   Advertise on IT Security News. Read the complete article: Collaboration…

What Google Is To Most Internet Users, Shodan Is To Hackers

This blog was first published in https://www.firecompass.com/blog/shodan-dorks-to-find-exposed-it/ What Google is to most internet users, Shodan (http://www.shodan.io) is to hackers. It is a search engine for hackers to look for open or vulnerable digital assets. Shodan scans the entire internet and stores…