How privacy laws have changed security auditor requirements

Introduction At the outset of 2018, it was hard to predict what the year ahead would have in store for consumer privacy. Between revelations of user data-sharing relationships between Facebook and... Go on to the site to read the full article ... Read More

How has the GDPR changed the role of a security manager?

Introduction In the wake of data breaches, hacks and leaks of trust like those by Cambridge Analytica, user privacy has quickly become a key issue of our time. While the United States’ policymakers... Go on to the site to read the full article ... Read More

How To Earn PMP PDU Credits

| | PMP PDU Credits
The Project Management Professional (PMP) and the PMI Talent Triangle are registered marks of the Project Management Institute, Inc. After hours of studying for the exam and years of on-the-job... Go on to the site to read the full article ... Read More

The Time Has Come for Rules of Engagement for Cyberwarfare

| | Cyberwarfare
After over half a century of unmatched global security dominance, the United States and its western allies are now faced with a rapidly-changing playing field in what is now considered the... Go on to the site to read the full article ... Read More

5 Reasons to Prioritize Security Awareness Training in 2018

| | Security Awareness
Victims of cyberattacks are in the news nearly every day. These organizations are big and small and represent healthcare, finance and utilities to local government and entertainment. In their... Go on to the site to read the full article ... Read More

How to Achieve DoD 8570 IAT Level I Compliance

| | DoD 8570
DoD IAT Level I Overview A part of the larger Department of Defense (DoD) Directive to provide guidance and procedures for the training, certification, and management of all government employees... Go on to the site to read the full article ... Read More

CISSP Domain 8 Refresh: Software Development Security

| | CISSP
In our cars, our watches, and even our refrigerators, software seems to be finding its way into everything. Along with its promise of increased productivity and data, however, are the risks that... Go on to the site to read the full article ... Read More

CISSP Domain 7 Refresh: Security Operations

| | CISSP
Even before the April 2018 revision by (ISC)^2, Domain 7: Security Operations has been one of the broadest and most dynamic of the Common Book of Knowledge. Covering topics that range from how... Go on to the site to read the full article ... Read More

CISSP Domain 6 Refresh: Security Assessment and Testing

| | CISSP
When just one exploited vulnerability can spell disaster for an organization’s brand, security assessments and software testing are a vital pillar of any information security program. A... Go on to the site to read the full article ... Read More