CERT-Certified Computer Security Incident Handler (CSIH)

When unforeseen cyber events happen, how important is it to have the right people (Certified Computer Security Incident Handler-CSIH) or team (Computer Emergency Response Team-CERT or Computer... Go on to the site to read the full article ... Read More

CISA Certification: Overview And Career Path

/ / cisa, Hacking
Introduction If you want to be an IT auditor, or are one now and don’t have a certification, then why not consider the Certified Information Systems Auditor (CISA) credential? This is among the 7 Top... Go on to the site to read the full article ... Read More
CRISC Domain 2: IT Risk Assessment

CRISC Domain 2: IT Risk Assessment

Connecting to the cyberspace offers convenience and opportunities for companies but also exposes them to risks. Fortunately, there are procedures that can be followed in order to protect data and... Go on to the site to read the full article ... Read More
Top 10 Things to Look for or Avoid When Choosing a Pen-Testing Vendor

Top 10 Things to Look for or Avoid When Choosing a Pen-Testing Vendor

The penetration testing market is currently booming and will continue to do so; in fact, the international company MarketsandMarkets, a provider of quantified B2B research, has estimated a growth... Go on to the site to read the full article ... Read More
Top 10 Reasons Why Pen-Testing is Important to Help Meet Compliance

Top 10 Reasons Why Pen-Testing is Important to Help Meet Compliance

Compliance is one of the most important aspects an organization needs to address. This means the company and its employees follow strict guidelines that can be external, due to regulations, laws, and... Go on to the site to read the full article ... Read More
The New (ISC)² CISSP CBK 2018

The New (ISC)² CISSP CBK 2018

A CISSP certification is a vendor-neutral credential by (ISC)² and one of the most valued by employers. Because the CISSP exam is experience-based, it routinely has updates to maintain the relevancy... Go on to the site to read the full article ... Read More
10 Steps Leaders Can Take to Improve Cybersecurity in their Organization

10 Steps Leaders Can Take to Improve Cybersecurity in their Organization

As revealed by an executive opinion survey in the World Economic Forum’s (WEF) Global Risk Report, the top concern for business leaders moving into 2018 is the potential for a cyber attack that... Go on to the site to read the full article ... Read More
The Top 25+ Information Security Events and Conferences of 2018

The Top 25+ Information Security Events and Conferences of 2018

Information security (InfoSec) conferences are a great way to become familiar with new developments and later trends in technology, as well as be made aware of the recent products and services to... Go on to the site to read the full article ... Read More
The Skills and Experience Needed to Support A CSIRT, SOC or SIEM Team

The Skills and Experience Needed to Support A CSIRT, SOC or SIEM Team

As the cyber-threat landscape evolves and data breaches escalate, incident response becomes more important than ever for any business. Consequently, to overcome any common challenges in security and... Go on to the site to read the full article ... Read More
CRISC: Exam Details & Process

CRISC: Exam Details & Process

In a fast-changing cyberspace landscape, CRISC-recognized professionals are essential for any companies thanks to their knowledge in the fields of IT risk management and IS control. As ISACA states:... Go on to the site to read the full article ... Read More
Loading...