(ISC)2

STUDY: SMALL BUSINESSES ARE MORE FOCUSED ON IOT INVESTMENTS THAN CYBERSECURITY

This post was originally published by (ISC)² Management. More than twice as many small businesses are investing in Internet of Things (IoT) technologies than in cybersecurity, according to recent research. And while this may raise some red flags, it is possible that small businesses are spending less on cybersecurity for justifiable reasons. Read more here: […]

OVERVIEW OF THE LATEST AWS SECURITY SERVICE – AMAZON DETECTIVE

This post was originally published by(ISC)² Management. Earlier this month, AWS announced that Amazon Detective is now available to all customers, reinforcing their dedication to helping customers hold up their end of the shared responsibility model. This shared responsibility model enables your organization to alleviate the burden of responsibility for the security of the physical infrastructure of AWS […]

3 WAYS TO FIND A CYBERSECURITY MENTOR

This post was originally published by (ISC)² Management. The needs of those pursuing a cybersecurity career are unlike any other field. Stress is high, and the knowledge and skills it demands are evolving and changing all the time. That’s why it’s a great idea to have a mentor to serve as a sounding board at […]

WHY YOU NEED A TECHNICAL AND STRATEGIC VIEW OF CLOUD SECURITY

This post was originally published by (ISC)² Management. When it comes to cloud security, it’s the Chief Information Security Officer’s (CISO) responsibility to understand the risks of a cloud architecture and develop a strategy for protecting against existing and emerging threats. Read more here: https://blog.isc2.org/isc2_blog/2020/04/why-you-need-a-technical-and-strategic-view-of-cloud-security.html Photo:www.infoq.com

SURVEY: COVID-19 RESPONSE SEES NEARLY 50% OF CYBERSECURITY WORKERS REASSIGNED TO IT TASKS

This post was originally published by (ISC)² Management. When asked about changes experienced due to COVID-19, almost half (47%) of cybersecurity professionals polled by (ISC)2 said they have been reassigned to IT tasks. These findings are part of the (ISC)2 Cybersecurity Pulse Survey, in which 256 cybersecurity professionals shared insights on their current work situations during the first […]

5 TIPS TO STAND OUT WHEN YOU HAVE LITTLE OR NO CYBER EXPERIENCE

This post was originally published by (ISC)² Management. So, you’ve decided you want to break into cybersecurity but have no relevant experience. The bad news is experience is important when it comes to working in this field. But that doesn’t mean finding your first job will be impossible either. Read more here: https://blog.isc2.org/isc2_blog/2020/04/5-tips-to-stand-out-when-you-have-little-or-no-cyber-experience.html Photo:www.cybersecurity-insiders.com

HEALTHCARE IS THE PREFERRED TARGET OF CYBER ATTACKERS

This post was originally published by (ISC)² Management. U.S. healthcare institutions are under constant attack from cybercriminals, and unless hospitals take concrete steps to protect themselves, the situation won’t get any better. In 2019, the healthcare industry was the number one target for cyber attackers, with the cost of breaches totaling $4 billion, according to […]

WHITE PAPER ON CLOUD SECURITY RISKS – AND HOW TO MITIGATE THEM

This post was originally published by(ISC)² Management. Cloud security today is touted as better than ever. So how do we explain the ever-increasing number of data breaches? According to the new white paper, Cloud Security Risks & How to Mitigate Them, the disconnect arises from a shared security model. Cloud Service Providers protect the datacenter, but customers […]

THREAT HUNTING: IS YOUR SECURITY OPERATION READY TO LAUNCH SUCH A PROGRAM?

This post was originally published by (ISC)² Management. It could be a blended attack as slick as a multichannel marketing campaign. Or a spontaneous crime of opportunity by a single dis-gruntled employee. It could even be an innocent configuration error. When a threat exists, there will be indicators. The perennial challenge is to hunt for […]

BREACHES INCREASED IN 2019, BUT THE NUMBER OF EXPOSED RECORDS DECLINED

This post was originally published by (ISC)² Management. The number of U.S. data breaches bumped up 17% in 2019 but despite the increase, the volume of sensitive consumer records that were exposed declined substantially by 65%, according to a newly published report. Read more here: https://blog.isc2.org/isc2_blog/2020/02/breaches-increased-in-2019-but-the-number-of-exposed-records-declined.html Photo:www.identityforce.com

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP) certification, (ISC)² offers a portfolio of credentials that are part of a holistic, programmatic approach to security.
Share this page