7 Most Difficult Information Security Certifications

| | IT Certifications
Demand for information security professionals has grown in the last few years, as more companies are upping the ante on protecting the security of their digital assets. The infosec workforce gap is... Go on to the site to read the full article ... Read More

The Increasing Threat of Banking Trojans and Cryptojacking

| | Hacking
Blockchain is one of the hottest and potentially among the most disruptive technologies today. So naturally, it’s a magnet for the criminal element, which is skilled at keeping up with... Go on to the site to read the full article ... Read More

10 Reasons Why You Should Pursue a Career in Information Security

| | Job Outlook
The escalating number of data breaches and threats like ransomware has created a mad dash for information security help. Organizations are scrambling to fill jobs and to compete for top talent, and... Go on to the site to read the full article ... Read More

Top 10 Skills Security Professionals Need to Have in 2018

| | Job Outlook
The shortage of information security talent gives infosec professionals a strong advantage in the job market, and those looking for new employment don’t have to wait long to find it.... Go on to the site to read the full article ... Read More

The Top 10 Highest-Paying Jobs in Information Security in 2018

| | Job Outlook
It’s a good time to be in the information security field. Not only are the jobs plentiful, but the shortage of talent to fill those jobs motivates employers to offer top salaries to candidates.... Go on to the site to read the full article ... Read More

7 Elements of a Successful Security Awareness Training Program

As cybersecurity experts often like to say, humans are the weakest link in an organization’s security. Technology can only go so far in protecting data and other assets, but the end users can... Go on to the site to read the full article ... Read More

Earning CISA CPE Credits

| | cisa
The Certified Information Systems Auditor (CISA) credential, offered through ISACA, requires certified practitioners to attain continuing professional education (CPE). The CPE program is designed to... Go on to the site to read the full article ... Read More

How to Detect and Prevent Direct Deposit Phishing Scams

| | Phishing
The same digital revolution that’s ushered in an era of business innovation has been as much of a boon for the enterprising criminal set. Moreover, organizations know that this revolution has a... Go on to the site to read the full article ... Read More

The 6 Latest Phishing Emails to Avoid in 2018

| | Phishing
Despite increased user awareness, phishing remains one of the biggest security threats to the enterprise. Of 1,450 data breach incidents in 2017, Verizon found that the majority — 1,192 — involved... Go on to the site to read the full article ... Read More

Security+: How Resiliency and Automation Strategies Reduce Risk

Introduction Architecture and design are critical components in reducing security risks. Risk can be reduced through resiliency — the ability to maintain acceptable service levels when essential... Go on to the site to read the full article ... Read More
Loading...