Top IT Security Bloggers

Isaca
  • Five Common Privacy Problems in an Era of Smart Devices

    Isaca
    I gave an Internet of Things (IoT) security and privacy keynote half a dozen times throughout the world last year, along with as many executive presentations. These presentations described the lack of security and privacy engineering within the devices themselves and related contributing factors. Throughout the recent holiday season, news broadcasts and publications warned about new IoT breaches, often resulting from insufficient data security controls being engineered into the devices, hackin...
  • CCPA’s Do Not Sell: It’s Here, But What Does It Mean?

    Isaca
    So, the California Consumer Privacy Act (CCPA) went into effect – and, the world didn’t burn. Companies have many issues to contend with, but one in particular has presented challenges to businesses that sell personal information. "Do not sell my personal information" requests (or opt-out requests), and confusion around what these really are, have many business leaders scratching their heads.What is the CCPA Do Not Sell Requirement?The CCPA provides several rights to California resi...
  • Complacency Presents a Glaring Career Risk

    Isaca
    Editor’s note: Alison Levine, First American Women's Everest Expedition Team Captain and a New York Times bestselling author of “On the Edge,” will be the opening keynote speaker at ISACA’s 2020 North America CACS conference, to take place 12-14 May in Baltimore, Maryland, USA. Levine draws upon her background in extreme adventuring to convey insights on leadership and overcoming difficult challenges. She recently visited with ISACA Now to provide her perspective on navigating fear and profess...
  • Another Buzzword Demystified: Zero-Trust Architecture

    Isaca
    I recently attended a security conference with multiple speakers covering a wide variety of topics – one of the topics, “Zero-Trust Architecture” (ZTA), was being addressed by one of the vendors, and I decided to sit-in to listen. A few minutes into the session, two facts became blaringly apparent – the speaker, who shall remain nameless, 1) did not actually understand what Zero-Trust Architecture is and what it means to implement Zero-Trust, and 2) this was a sales pitch disguised as an educa...
  • Storing for the Future: How Data Centers Will Advance in 2020

    Isaca
    The idea that data is an incredibly valuable resource in the modern business landscape isn’t new—but best practices for managing that data seem to change almost by the year. More than ever, enterprises leverage data centers to do their work, and savvy executives will be looking ahead in 2020 and beyond to learn how data can be managed more effectively.Let’s consider three key questions here.How will the advancement of AI improve the efficiency of data center technology?Increasingly, artifici...
  • In the New Year, Don’t Fall Back Into the Same Bad Cybersecurity Habits

    Isaca
    Around this time each year, many people aim to follow through on their New Year’s resolutions with the hope of finally being able to break that bad habit, which can prove trickier than we would like. Unfortunately, the same often holds true in our approach to cybersecurity. Despite repetitive cybersecurity reminders, time and time again, we fall back into old habits. However, the new year seems like the perfect time to try to convince you that those bad cybersecurity habits might not be so har...
  • Who Will Harness AI More Effectively in the New Decade: Cybercriminals or Cybersecurity Professionals?

    Isaca
    We know artificial intelligence will loom large in the new decade, and we know cybersecurity will be critically important as well. How those two forces intersect sets up as one of the most fascinating – and consequential – dynamics that will shape society’s well-being in the 2020s.According to ISACA’s new Next Decade of Tech: Envisioning the 2020s research, cybersecurity is the area in which AI has the potential to have the most positive societal impact in the new decade, with areas such as h...
  • Key Steps to Ensuring CISO Effectiveness

    Isaca
    In the classic movie “The Wizard of Oz,” protagonist Dorothy Gale leaves Kansas and enters a new world, the land of Oz. While Oz is unfamiliar and unlike anything Dorothy has encountered before, she is able to navigate fairly well because she has a roadmap – the Yellow Brick Road. CISOs are not as fortunate as Dorothy. For CISOs, the expectations may be clear (from operational oversight to organizational politics to managing talent), but a roadmap to being effective in meeting those expectatio...
  • Five Revealing Security Incidents of 2019, and What We Can Learn from Them

    Isaca
    Every year has its share of security gaffes, breaches, and hacker “shenanigans.” As we enter into the new year, it is inevitable that we will see articles in the mainstream and trade press recapping the worst of them. There are two reasons why these lists are so prevalent. The first is human nature: fear gets attention. Just like a product vendor using FUD (fear, uncertainty, doubt) to boost sales, so too can fear drive journalistic readership. So, it’s natural that the trade media would cove...
  • Connecting COBIT 2019 to the NIST Cybersecurity Framework

    Isaca
    Among the most exciting projects I’ve worked on has been the integration of NIST’s Cybersecurity Framework with COBIT. Now, with the update of that project to COBIT 2019, entities around the globe will have a fresh and agile methodology for improving cybersecurity! The NIST CSF provides a model based on five functions: IDENTIFY important information & technology (I&T) and what threatens it; discuss and analyze how best to PROTECT I&T; determine how best to DETECT issues; RESPOND qu...