Isc2 - blog.isc2.org - (ISC)2 Blog
General Information:
Latest News:
The virtual aspects of security 26 Jul 2013 | 08:21 am
Security in the virtual world. It's impressive as people abandon concepts due to simple "name changes"... I'm referring here to network and system admins that stop deploying some traditional control...
Of Mice and Men 12 Jul 2013 | 04:35 pm
I’ve noticed a number of articles recently based on historical summaries of threats past – for instance, a ‘brief history of Apple hacking’ (see also my commentary for Infosecurity Magazine) and SC Ma...
Honing your presentation skills for security awareness 21 Jun 2013 | 03:09 am
Today on CISSPforum we've been chatting about Death by Powerpoint, the feeling that badly constructed and delivered presentations are not just tedious but counterproductive. Notable examples include e...
(ISC)2’s CCFP Credential – The Standard of Excellence in Cyber Forensics 10 Jun 2013 | 11:07 pm
Our cyber world is so rife with threats and breaches that most information security professionals have realized that a compromise is fairly certain at some point. Rather than focus on this bleak reali...
(ISC)2’s CCFP Credential – The Standard of Excellence in Cyber Forensics 10 Jun 2013 | 11:07 pm
Our cyber world is so rife with threats and breaches that most information security professionals have realized that a compromise is fairly certain at some point. Rather than focus on this bleak reali...
Security “for free”? 29 May 2013 | 12:29 pm
As security professionals, we are continuously facing the challenge of smaller and smaller budgets allocated to maintain and improve the IT security. That’s probably the main reason why there is alway...
Security “for free”? 29 May 2013 | 12:29 pm
As security professionals, we are continuously facing the challenge of smaller and smaller budgets allocated to maintain and improve the IT security. That’s probably the main reason why there is alway...
The evolution of support scamming 11 May 2013 | 06:21 pm
Cold-call tech support scams. Didn't they go away when the Federal Trade Commission cracked down on them in the US? Actually, while the FTC crackdown wasn't quite as comprehensive as it might have see...
The evolution of support scamming 11 May 2013 | 06:21 pm
Cold-call tech support scams. Didn't they go away when the Federal Trade Commission cracked down on them in the US? Actually, while the FTC crackdown wasn't quite as comprehensive as it might have see...
Secure Software Development – Closing the Gap between Risk Awareness and Response 15 Apr 2013 | 11:00 pm
by Mano Paul, CISSP, CSSLP, MCSD, MCAD, CompTIA Network+, ECSA As highlighted in the recently released 2013 Global Information Security Workforce Study (GISWS) – the largest vendor-neutral study of it...