cybersecurity

WRITING CYBERSECURITY ARTICLES – SETTING UP YOUR WRITING PROCESS

This post was originally published here by  (ISC)² Management. Writing can be one of those professional development win-win activities that not only brings joy to the person engaged in it, but also brings knowledge, value — and yes, in some cases even joy — to the reader. All of us remember reading a particularly well-crafted sentence and […]

CYBERSECURITY AWARDS FOR LEADING PROFESSIONALS

This post was originally published here by (ISC)² Management. Nominations are now open for the 2019 Information Security Leadership Awards Americas. The awards will be presented during a ceremony at (ISC)² Security Congresson Wednesday, October 30 at the Walt Disney World Swan and Dolphin Resort in Orlando and will be open to All-Access pass attendees. As this […]

CYBERSECURITY FALLS SHORT IN ORGANIZATIONS UNDERGOING DIGITAL TRANSFORMATION

This post was originally published here by (ISC)² Management. While C-level executives understand the need for cybersecurity as their organizations undergo digital transformation, they aren’t prioritizing it enough, according to a recent Deloitte report based on a survey of 500 executives. The report, “The Future of Cyber Survey 2019,” reveals a disconnect between organizational aspirations […]

ADDITIONAL RECOGNITION FOR CYBERSECURITY CERTIFICATIONS

This post was originally published here by (ISC)² Management . Following the signing of a Multilateral Recognition Arrangement (MLA) signed last year that confirms the American National Standards Institute’s (ANSI) standing as an internationally respected accrediting body with rigorous standards, all nine (ISC)² cybersecurity certifications are now recognized by the International Accreditation Forum (IAF). The MLA applies to IAF […]

Cyber Threat news trending now on Google

1.) One of the cyber threat news articles which is trending on google right now is about a cyber attack on Singapore Red Cross(SRC) website which has led to the leak of personal data of more than 4,000 blood donors. The news comes just after SingHealth cyber attack which took place almost 5 months ago […]

U.S. PRESIDENTIAL ORDER AIMS TO BOLSTER FEDERAL CYBERSECURITY

This post was originally published here by (ISC)² Management. An Executive Order signed by United States President Donald Trump aims to grow the government’s cybersecurity capability, improve integration of the cybersecurity workforce between federal departments, and strengthen the skills of individual cybersecurity practitioners. The order, titled Executive Order on America’s Cybersecurity Workforce and signed by the president […]

HEAVY INDUSTRIAL COMPANIES GRAPPLE WITH CYBERSECURITY PROBLEMS

This post was originally published here by (ISC)² Management. Companies in heavy industrial industries such as mining, oil and gas, electricity and chemicals have become a major target for cybercrime. But securing these companies is complicated as they must not only protect their IT infrastructure but also their OT (operational technology) assets. Cybersecurity solutions and […]

Oracle Weblogic Servers are vulnerable to ransomware attacks

Cisco Talos security researchers have made a recent discovery that a zero-day vulnerability in Oracle Weblogic Servers is making them susceptible to ransomware attacks. Hackers are reported to be using the vulnerability to install a new strain of ransomware called Sodinokibi along with some versions of GandCrab ransomware. What’s astonishing in the recent discovery is […]

THE TIME IS NOW TO BUILD ON WOMEN’S CYBERSECURITY GAINS

This post was originally published here by  (ISC)² Management. There’s never been a better time to be a woman in cybersecurity than now. Granted, there are many gains to be made still, but recent research about progress already made by women in the field is very encouraging. Although the industry is dominated by men, so […]

These Cybersecurity issues can expose your personal data to cyber attacks

As our dependence on computing devices is growing day by day, so are the issues related to cybersecurity. So, with much of our personal lives being stored on devices, simple browsing on an occasional note or enabling certain smartphone settings might leave our data vulnerable to hackers. The only way to ensure that the data […]