Critical Components of Implementing a Successful Security Champions Program

Organizations focused on creating a security culture are looking for new, innovative ways to create security awareness and inspire employees at all levels to take ownership of security. One the... Go on to the site to read the full article ... Read More

Earning CISA CPE Credits

| | cisa
The Certified Information Systems Auditor (CISA) credential, offered through ISACA, requires certified practitioners to attain continuing professional education (CPE). The CPE program is designed to... Go on to the site to read the full article ... Read More

How to Detect and Prevent Direct Deposit Phishing Scams

| | Phishing
The same digital revolution that’s ushered in an era of business innovation has been as much of a boon for the enterprising criminal set. Moreover, organizations know that this revolution has a... Go on to the site to read the full article ... Read More

The 6 Latest Phishing Emails to Avoid in 2018

| | Phishing
Despite increased user awareness, phishing remains one of the biggest security threats to the enterprise. Of 1,450 data breach incidents in 2017, Verizon found that the majority — 1,192 — involved... Go on to the site to read the full article ... Read More

Security+: How Resiliency and Automation Strategies Reduce Risk

Introduction Architecture and design are critical components in reducing security risks. Risk can be reduced through resiliency — the ability to maintain acceptable service levels when essential... Go on to the site to read the full article ... Read More

Security+: Security Implications of Embedded Systems

Introduction The Internet of Things (IoT) is changing both how we live and how we do business. You can find embedded (or smart) devices everywhere, from the doctor’s office and the public... Go on to the site to read the full article ... Read More

Security+: How to Explain Threat Actor Types and Attributes

Introduction One of the roles of information security professionals is to defend their organization’s systems and data proactively. As with any defensive strategy, this requires knowing the... Go on to the site to read the full article ... Read More

Security+ Domain #1: Threats, Attacks, and Vulnerabilities

|
Introduction The first domain in CompTIA’s Security + exam (SYO-501) covers threats, attacks and vulnerabilities. This domain contributes 21 percent of the exam score. The exam’s objectives are... Go on to the site to read the full article ... Read More
Loading...