Category Archives: InfoSec

Lack of Security and Network Resources: A Major Hurdle in Digital Transformation

Initiatives for Digital Transformation are at front and center of every major corporation to keep their business competitive and relevant. Many technology research organizations are publishing papers about different aspects of digital transformation, which is categorized  as a new industrial … Continue reading

Posted in Digital Transformation, InfoSec, IoT, Leadership | Tagged , , | Comments Off on Lack of Security and Network Resources: A Major Hurdle in Digital Transformation

2016 CISO MindMap – What do InfoSec Professionals Do?

Please note that this is an older post An updated MindMap available here. It took some time to update the CISO MindMap but finally it is here. Thanks to all who provided suggestions for this update. A very rapid change … Continue reading

Posted in cisomindmap, InfoSec, IoT, Leadership | Tagged , , , , | Comments Off on 2016 CISO MindMap – What do InfoSec Professionals Do?

IoT Design Review

Embedding security into architecture and design of major IoT projects is the best way to catch problems earlier, avoid costly patchwork, lower the risk of data breaches, and to meet compliance needs. However, research shows that most of the times … Continue reading

Posted in InfoSec, IoT | Tagged , , , | Comments Off on IoT Design Review

Breaking the Phishing Attack Chain

Phishing is becoming a major threat vector and preferred method for attackers to break into victim networks. Verizon Data Breach Investigations Report shows that more than two-third attacks in espionage category used phishing as an attack vector. Typical phishing attacks … Continue reading

Posted in InfoSec | Comments Off on Breaking the Phishing Attack Chain

Verizon Data Breach Digest – A Must-Read for CISOs

Data Breach Digest is the latest report from Verizon RISK team. This is the same Verizon team that publishes Verizon Data Breach Investigations Report or more commonly known as DBIR. The main idea behind the Data Breach Digest is to … Continue reading

Posted in InfoSec | Comments Off on Verizon Data Breach Digest – A Must-Read for CISOs

Internet of Things (IoT) and Why It Matters Now

IoT is all about connecting devices and machines to the Internet who can talk to each other, collect and share data, analyze the data, and bring business value out of data analytics. A fair argument is that we have been … Continue reading

Posted in InfoSec | Tagged , , | Comments Off on Internet of Things (IoT) and Why It Matters Now

SDN Impact on Information Security

Software Defined Networking or SDN brings a paradigm shift and new promises about how networks are designed and operated. The biggest change is separating the control plane from the data forwarding plane, which, in the current network paradigm are tied … Continue reading

Posted in InfoSec | Tagged | Comments Off on SDN Impact on Information Security

The Latest 2015 CISO Mind Map is here!

Note: There is an updated CISO Mind Map for 2018 on this URL As the InfoSec landscape changes constantly, so do the responsibilities of a CISO. Virtual Security Appliances are becoming more common in the Cloud environment. Similarly IoT and … Continue reading

Posted in cisomindmap, InfoSec | Tagged , , , | Comments Off on The Latest 2015 CISO Mind Map is here!

A Quick Overview of Verizon 2015 DBIR – DBIR15

The Verizon 2015 DBIR just released today, and as someone said. It is “the best” DBIR ever. The report provides a number of important findings and new data analysis especially around the cost of data breaches. The report contains analysis … Continue reading

Posted in InfoSec | Tagged , , , | Comments Off on A Quick Overview of Verizon 2015 DBIR – DBIR15

A take on information security reports

There are almost as many information security reports out there as the number of security vendors. Keeping up to date about these reports could be a challenge and sometimes these reports may become an information overload for security professionals. Verizon … Continue reading

Posted in InfoSec | Tagged , , | Comments Off on A take on information security reports