(ISC)2

LACK OF TRAINING AND RESOURCES PLAGUES IT SECURITY TEAMS

This post was originally published here by (ISC)² Management . Although some organizations have splintered cybersecurity from IT for structural purposes, typically IT teams shoulder the responsibility for security. This means IT professionals are the people who enforce the policies and run the tools to protect their organizations’ data. But even though IT teams are the […]

SECURITY HEADLINES: WORLD CUP, IT AND EVERYTHING IN BETWEEN

This post was originally published here by (ISC)² Management. Pardon our absence on the blog this past week. Hurricane Irma had plans of her own, but we’re back in business and ready to break down the top security headlines for the week of September 11, 2017: The fear of foreign hacking is not just related […]

TOP 10 (ISC)² WEBCASTS OF 2017

This post was originally published here by  (ISC)². (ISC)² webcasts are a great source for insight into all areas of security. From the Internet of Things to malware and compliance, the topics vary. Here are the top 10 (ISC)² webcasts for 2017 so far as ranked by cybersecurity professionals:   Part 1: Future of SIEM […]

SECURITY HEADLINES: SPYING & STEALING

This post was originally published here by  (ISC)² Management. Spying, stealing, defacing. It’s been a busy week. These are the top security headlines for the week of August 28, 2017: The U.S. Navy says there’s no evidence of a cyber attack in the crash of the USS John S. McCain – but hypothetically, this is how it would […]

SECURITY HEADLINES: WORD MALWARE, CLOUD DISASTERS AND MORE

This post was originally published here by (ISC)² Management. Malware through Word, hacked robots and cloud disasters? No wonder we have anxiety. These are the top security headlines for the week of August 21, 2017: Clippy never warned us about this! Attackers are exploiting a Microsoft Word feature that auto-updates links to install malware.   The financial […]

PSEUDO-RANSOMWARE AND SECURITY BUDGETS

This post was originally published here by  (ISC)² Management. Pseudo-ransomware and struggling security budgets. Here are the top security headlines for the week of August 14, 2017: Who would have thought we would long for the days when ransomware was ransomware. Now it’s all too complicated. Bitcoin is going mainstream, but does that mean it’s a […]

GARTNER EXPECTS $93 BILLION IN SECURITY SPEND, BUT WHAT’S MISSING?

This post was originally published here by  (ISC)² Management. Gartner recently released its global information security spending forecast and concluded that security products and services investment will reach $83.4 billion by the end of 2017 (a 7% increase over 2016). The firm also is predicting spending to reach $93 billion in 2018, a 12% increase over this […]

Filling in Threat Detection Gaps: a Q&A Interview with Danny Akacki

This post was originally published here by Sqrrl Team. Danny Akacki currently works as part of a hunt team at a Fortune 100 company in the financial sector. He started threat hunting at Mandiant as part of David Bianco’s team, and has spent the past four years working in threat hunting and incident response. Key Takeaways: Embrace “purple […]

SECURITY HEADLINES: PAYOUTS AND PANIC

This post was originally published here by (ISC)² Management .   WannaCry and NotPetya aftermath means payouts and panic. Here are the top security headlines for the week of August 7, 2017: Big money, no whammies! It seems like the hackers behind WannaCry have cashed out their bitcoin into Monero, a harder to track cryptocurrency. Mo money means […]

SECURITY HEADLINES: HACKING ATMS, HBO AND MORE

This post was originally published here by  (ISC)² Management. ATMs, HBO, democracy … what can’t be hacked? Here are the top security headlines for the week of July 31, 2017: IOActive hacked at ATM at Black Hat. I guess drinks are on them? Espionage was just a red herring. Apparently hackers in North Korea are looking […]

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
Share this page