Home Tags CISSP

Tag: CISSP

Where Cybercriminals Go To Buy Your Stolen Data

What malicious sites provide both free and paid access to stolen credit cards, company databases, malware and more? 1 of 10 Image Source: imsmartin With nothing more...

A Job In Security Leads To Job Security

Developers who focus on secure development skills find themselves in high demand. Developers who choose to augment their knowledge with secure development skills will find...

5 security practices hackers say make their lives harder

Whether they identify as white hats, black hats, or something in between, a majority of hackers agree that no password is safe from them...

Security Leadership & The Art Of Decision Making

What a classically-trained guitarist with a Master's Degree in counseling brings to the table as head of cybersecurity and privacy at one of the...

eShore Ltd inspires the next generation of Information Security leaders

Press Release Cayman-based eShore Ltd has helped inspire 15 IT security professionals to obtain the industry accredited Certified Information Systems Security Professional (CISSP) certification in...

Profiles Of The Top 7 Bug Hunters From Around the Globe

'Super hunters' share a common goal: to find the most high impact valid bugs before a bad guy does. 1 of 8 Image Source: imsmartin/Bugcrowd The true...

Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets...

Whether it's due to lack of attention, poor capital planning or alert fatigue, there are lots of reasons why an SOC can become unhealthy....

LogRhythm’s Network Monitor 3 Boosts Advanced Threat Detection And Mitigation Via...

Detects Ransomware, Spear Phishing, APTs and Other Tier-1 Threats FasterMay 17, 2016— LogRhythm, The Security Intelligence Company, today announced immediate availability...

What Makes Next-Gen Endpoint Protection Unique?

Here are five critical factors you need to know about today's new breed of endpoint protection technology. Image Source: imsmartin As the world of fraud, phishing,...

Right Honourable David Blunkett to Deliver Opening Keynote at Inaugural (ISC)²...

Registration now open; over 30 educational sessions, five panel debates, and pre-conference certification workshops London, UK, Sept 2, 2014 - (ISC)²® ("ISC-squared"), the largest...

Security Think Tank: Planning key to incident response

Much has been published about incident response: there is a comprehensive document produced by the US National Institute of Standards and Technology and several thousand...

What makes the ideal chief information security officer?

The chief information security officer (CISO) holds a unique position in the organisation with responsibility for ensuring the protection of information and systems that...