Category: (ISC)² Blog

The Pitfalls of Poor Software Implementation

This article has been indexed from (ISC)² Blog The importance of apps to businesses Software applications (apps) are at the heart of modern business success and have transformed the way companies handle their operations. A well designed and developed app…

Cybersecurity Leaders: Think in Business Terms

This article has been indexed from (ISC)² Blog The vast majority of cybersecurity chiefs (93%) do not report to the CEO, according to a recently published report. As a result, a lack of communication between the C-suite and cybersecurity leaders…

READY To Celebrate Global Achievement Award Winners?

This article has been indexed from (ISC)² Blog The (ISC)² Global Achievement Awards (GAA) recognize individuals who have significantly impacted the cybersecurity community. Recognizing these winners and learning about their contributions helps to inspire a safer and more secure cyber…

Relevance Requires More than Just Paying Attention

This article has been indexed from (ISC)² Blog Accelerating Your Security Career Requires More Than Just Paying Attention Many InfoSec professionals have seen so many breaches, whether through personal experience, or in the news, that it becomes apparent that a…

The Role of Culture in Compliance

This article has been indexed from (ISC)² Blog When it comes to compliance in cybersecurity there are many regulations in play, GDPR, CCPA, HIPAA, to name but a few. Whilst you may have to take a key role in these…

Malware, Cybercrime and Cloud Security

This article has been indexed from (ISC)² Blog Organizations have expedited use of and reliance on public cloud services to run their businesses in ways that would have been hard to anticipate, even a few years ago. And for many…

How Can CCSP Certification Help Your Organization?

This article has been indexed from (ISC)² Blog Is your organization protected with a stronger cloud security posture from new concepts and technologies like Zero Trust, micro segmentation, containerization and microservices? With Certified Cloud Security Professional (CCSP) training, cybersecurity teams…

Are you READY for (ISC)² Security Congress?

This article has been indexed from (ISC)² Blog Last year was a first for (ISC)² Security Congress, as our conference took place entirely virtually. The COVID-19 pandemic forced nearly all events in 2020 to go virtual and we’re excited to…

Business Continuity – The Light in a Time of Darkness

This article has been indexed from (ISC)² Blog As a security practitioner, perhaps you have found yourself in meetings about Risk Management. Or, perhaps, you are part of the incident response team, where you are responsible for everything from preparation,…

CCSP: The Best Way to Achieve Cloud Security

This article has been indexed from (ISC)² Blog Cloud security skills can be seen as very similar to the security skills for any on-premises data center. But in many instances, organizations are learning that their familiar applications cannot simply be…

Best Practices and Techniques for Pseudonymization

This article has been indexed from (ISC)² Blog Pseudonymization is a de-identification process that has gained traction due to the adoption of GDPR, where it is referenced as a security and data protection by design mechanism. The application of pseudonymization…

Help Shape the ISSMP Exam

This article has been indexed from (ISC)² Blog (ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline (or exam blueprint) of its certification examinations. A JTA is the methodical process used to determine tasks…

An Inside Look at Cloud Security from Industry Experts

This article has been indexed from (ISC)² Blog Today’s cybersecurity skills shortage is threatening safe cloud adoption – and cloud security is the No. 1 area most impacted by the shortfall. To help fill the gaps, more professionals are expanding…

Make New Connections with (ISC)² Community

This article has been indexed from (ISC)² Blog Are you looking for a space to connect with your peers in the cybersecurity industry? (ISC)² Community connects you to a global network of cybersecurity professionals through an interactive and engaging platform.…

Online Proctor Exam Pilot Results

This article has been indexed from (ISC)² Blog On February 28, 2021, (ISC)² concluded a pilot test that assessed the feasibility of online proctoring for exams that are an essential part of our nine certification programs. Online examinations for the…

Healthcare Privacy–Bigger Than Just HIPAA

This article has been indexed from (ISC)² Blog Security Without Regulatory Muscle As a security practitioner, you may have worked in an industry that was not affected by any regulatory authority. There was a time when security was not driven…

What’s Next for Cybersecurity Workers? You Tell Us.

This article has been indexed from (ISC)² Blog The annual (ISC)² Cybersecurity Workforce Survey needs your experience and opinions to help shape the conversation. As we find ourselves more than one year into a global pandemic, we want to accurately…

Cloud (Mis)Configuration: What Do You Need to Consider?

This article has been indexed from (ISC)² Blog Should you adopt the default security configuration from your Cloud Service Provider to avoid a misconfiguration incident? If you do, proceed with caution. Some default settings may not be required in your…

Do You Have These Top Cyber Security Skills?

This article has been indexed from (ISC)² Blog An interesting take-away from the (ISC)2 Cybersecurity Career Pursuers Study is what cybersecurity professionals told us were the most important technical skills for those looking for their first cybersecurity job. When current…

Unlimited Access to Free Industry Leading Cybersecurity Webinars

This article has been indexed from (ISC)² Blog (ISC)² Webinars are an opportunity to take part in active, educational and engaging sessions delivering up-to-date knowledge from cybersecurity experts. Experienced and vetted professionals lead discussions on industry-relevant topics with four to…

CISSPs from Around the Globe: An Interview with Jason Lau

The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors that certification opens to a CISSP professional. Those doors lead to many different types…

Help Shape The HCISPP Exam

(ISC)² regularly conducts Job Task Analysis (JTA) studies to review and update the content outline (or exam blueprint) of its credentialing examinations. A JTA is the methodical process used to determine tasks that are performed by credential holders and knowledge…

Keeping Excess Out of Access

Read the original article: Keeping Excess Out of Access How Much Access is Too Much? Many security practitioners grapple with the problem of their colleagues demanding too much access to network resources. Sometimes, it is not just people who request…

These Roles Require Cybersecurity Training

Read the original article: These Roles Require Cybersecurity Training With data breach rates rising and criminal attack methods becoming more sophisticated each day, it is essential for every organization to take security seriously. That means cybersecurity training and education so…

Cyber Threats: The Financial System’s Top Risk

Read the original article: Cyber Threats: The Financial System’s Top Risk With cyber attacks against financial and banking institutions now a daily occurrence, cyber threats have become the biggest risk to the global financial system, according to Federal Reserve Chairman…

The Delicate Balance of Security Versus Usability

Read the original article: The Delicate Balance of Security Versus Usability Why Does This Have to Be So Hard? As a security practitioner, how often have you heard the refrain from your colleagues that one of the security protocols that…

Building Cyber Resilience in a Cloudy World

Read the original article: Building Cyber Resilience in a Cloudy World Last year taught us a valuable lesson: Always be prepared for the unknown. In a cybersecurity context, fostering resilience requires thinking of all possible scenarios – even if they…

Updates to the (ISC)² CAP Exam. What is Changing?

Read the original article: Updates to the (ISC)² CAP Exam. What is Changing? Earlier this year, we announced an upcoming update to the Certified Authorization Professional (CAP) certification. This (ISC)² certification exam will be updating on August 15, 2021. During…

Wanted: Software Developers with a Security Mindset

Read the original article: Wanted: Software Developers with a Security Mindset The modern software developer faces an enormous amount of challenges. From continuously creating innovative apps to ensuring high quality and meeting tight deadlines, developers need to cope with many…

Hush – This Data Is Secret

Read the original article: Hush – This Data Is Secret Is There Ever Too Much Data? As a security practitioner, you know that businesses are fuelled not only by people but by data. Years ago, the phrase “Big Data” was…

Under the Hood: Inside (ISC)² Exam Development Cycle

Read the original article: Under the Hood: Inside (ISC)² Exam Development Cycle Clar Rosso, (ISC)² CEO and Casey Marks, Chief Product Office and VP, (ISC)² recently hosted the latest in our new Inside (ISC)² webinar series, a quarterly series designed…

CISSPs from Around the Globe: An Interview with Mari Aoba

Read the original article: CISSPs from Around the Globe: An Interview with Mari Aoba The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors…

FBI: Cybercrime Shot Up in 2020 Amidst Pandemic

Read the original article: FBI: Cybercrime Shot Up in 2020 Amidst Pandemic In 2020, as the world grappled with a fast-spreading global pandemic, the FBI received more than 2,000 complaints each day, totaling 791,790 for the year. This represents a…

How To Get It Right With Cybersecurity Training

Read the original article: How To Get It Right With Cybersecurity Training The cybersecurity team can be a challenging one for organizations to keep engaged and happy. Talent is scarce, turnover and burnout rates are high. That’s why employers have…

What Are the Best Free Cybersecurity Webinars?

Read the original article: What Are the Best Free Cybersecurity Webinars? CISSP trends strong with BrightTALK webinar viewers. BrightTALK, our primary webinar platform, identifies the most popular and trending topics out of more than 100,000 security and technology talks. We…

What Are the Phases of an Incident Response Plan?

Read the original article: What Are the Phases of an Incident Response Plan? Disaster recovery is now a normal part of business operations. However, before the year 2000, disaster recovery was a “nice to have” addition to a business. Then,…

Challenges and Misconceptions of Certificate Revocation in PKI

Read the original article: Challenges and Misconceptions of Certificate Revocation in PKI By Qamar Peer Bellary Sadiq, CISSP, CCSP Public Key Infrastructure is the most commonly used technology in security space for the purpose of establishing Authentication, Data Integrity, Non-Repudiation,…

Global Achievement Awards – What’s new in 2021?

Read the original article: Global Achievement Awards – What’s new in 2021? Nominations are now open for the (ISC)² Global Achievement Awards. These awards recognize individuals whose excellence, leadership and volunteer efforts have significantly advanced the cybersecurity industry and contributed…

How You Can Take The CISSP Exam From Home

Read the original article: How You Can Take The CISSP Exam From Home For a limited time – February 22-28, 2021 – (ISC)² is pilot testing the option to take the CISSP online exam from home. Last year, as the…

The Weeds and Flowers of Information Security

Read the original article: The Weeds and Flowers of Information Security Why it is essential to have experience – and not JUST to pass the CISSP Growing The Garden of InfoSec Think about your path in information security. It took…

Quick Survey: SolarWinds Incident

Read the original article: Quick Survey: SolarWinds Incident The SolarWinds cyber incident has dominated security headlines since the end of December. (ISC)2 wants to hear opinions from practitioners in the field on what impact it really had. Take our quick…

The Importance of a Good Software Security Policy

Read the original article: The Importance of a Good Software Security Policy Policy is Everywhere Think of every company you have ever worked for. Whether it was a job in a warehouse, or employment in an office, there was always…

Using a Crisis Wisely

Read the original article: Using a Crisis Wisely Upskilling in times of uncertainty and change is a prudent career decision By Tony Vizza, CISSP, CCSP The saying “everything happens for a reason” is often invoked as a message of support…