Benchmarking Web Application Firewall (WAF) Solutions

Benchmarking Web Application Firewall (WAF) Solutions

Today web applications are ubiquitous and in many cases, the primary source of engagement between the user and the organization. Traditionally, organizations relied on network security controls such as network firewalls and IDS/IPS as the primary defence mechanism even for applications, but that is a very flawed approach. Application security requires organizations to rethink theirRead more about Benchmarking Web Application Firewall (WAF) Solutions[…]

Top Emerging Cyber Security Vendors To Look Out For In 2018

Top Emerging Cyber Security Vendors To Look Out For In 2018

Looking for Top Emerging Companies in the Cyber Security Industry?  FireCompass presents 50 Emerging Cyber Security Vendors to look out for in 2018. We don’t claim this is exhaustive list because there might be a possibility that we might have missed some of the products. But still we gave our best to give you theRead more about Top Emerging Cyber Security Vendors To Look Out For In 2018[…]

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

Webinar-Insider Threat Intelligence: Creating A Robust Information Security System

What will you learn: Overview of data leakages Cases Risks Solutions Protection against data leakages Main challenges Sources of data leakages Tools and solutions Data Leakage Prevention systems Core principles and technologies involved Layered insider threat intelligence Visualization of information flows Pinpoint control of suspicious activities Mobile environment and insider threats About Speaker:   NikitaRead more about Webinar-Insider Threat Intelligence: Creating A Robust Information Security System[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Webinar- Mastering Next Gen SIEM Use Cases (Part2)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 2 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part2)[…]

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Webinar- Mastering Next Gen SIEM Use Cases (Part1)

Explore in-depth Use Cases of Next-Gen Security Information and Event Management (SIEM) – Part 1 of 3 series.   What will you learn: Tools and techniques – understanding the taxonomy Top use cases for the SOC Attack surfaces Insider threat Credential theft Endpoint compromise Application attack Monitoring / Building / SWIFT Fraud Analytics and hunting playbooks for SWIFT AboutRead more about Webinar- Mastering Next Gen SIEM Use Cases (Part1)[…]

Cybersecurity Landscape for Indian BFSI Industry (2018)

Cybersecurity Landscape for Indian BFSI Industry (2018)

Cyber risks have evolved significantly over the last couple of years across industry sectors. Cybersecurity  is  a  matter  of  growing  concern  as  cyber-attacks  cause  loss  of income,  sensitive  information  leaks,  and  even  vital  infrastructures  to  fail. The BFSI industry, in particular, has become the target of choice with malicious actors exploring every avenue they canRead more about Cybersecurity Landscape for Indian BFSI Industry (2018)[…]

Top Cyber Security Companies at RSA Innovation Sandbox 2018

Top Cyber Security Companies at RSA Innovation Sandbox 2018

RSA Innovation Sandbox Contest for the past 12 years has been awarding most innovative information security companies and products.  Let’s have a look at those companies who emerged as innovative cyber security startups at RSA Conference 2018. BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can nowRead more about Top Cyber Security Companies at RSA Innovation Sandbox 2018[…]

India Security Buying Priority Report 2018

India Security Buying Priority Report 2018

  CISO Platform in association with FireCompass launches India Security Buying Priority Report (2018). This is the annual survey in which 395+ Companies have participated in the enterprise segment, varying over different verticals and regions. The key findings of the report includes- Implementation Status of some of the important technologies like Deception, Enterprise Mobility Management (EMM), Network AdvancedRead more about India Security Buying Priority Report 2018[…]

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA

We are here, once again, with our list of Top 20 Emerging IT Security Vendors from 500+ vendors attending RSAC 2018, April 16 to 20 in San Francisco. BTW, We have also created a RSAC 1-Minute Itinerary tool for the ease of attendees, through which you can now navigate the maze of 500+ Vendors at RSAC Expo likeRead more about 20 Emerging IT Security Vendors to Look Out for in RSA Conference 2018, USA[…]

Information Security Metrics and Dashboard for the CEO / Board

Information Security Metrics and Dashboard for the CEO / Board

It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the CEO to understand the information security posture of the company. Many of the CISOs I knowRead more about Information Security Metrics and Dashboard for the CEO / Board[…]