Top IT Security Bloggers

Isaca
  • Government Officials Must Become Better Attuned to Data Privacy Regulations

    Isaca
    Data privacy and security is more important than ever before. Despite existing policies, the number of data breaches is on the rise and unencrypted personal information is getting into the wrong hands.In 2016, the EU adopted the General Data Protection Regulation (GDPR) to combat the problem of data security. Since then, other data protection laws have gone into effect and businesses all over the world have adopted stricter standards for collecting and storing data. It seems logical to assume...
  • Artificial Intelligence: A Damocles Sword?

    Isaca
    “Artificial intelligence (AI) is proving to be a double-edged sword. While this can be said of most new technologies, both sides of the AI blade are far sharper, and neither is well understood.” - McKinsey Quarterly April 2019In Greek mythology, the courtier Damocles was forced to sit beneath a sword suspended by a single hair to emphasize the instability of kings’ fortunes. Thus, the expression “the sword of Damocles” to mean an ever-present danger.To use this idiom metaphorically, the user...
  • Who Am I? CRISC Equips Professionals and Organizations with a Valuable Identity

    Isaca
    As a risk practitioner, have you ever tried to describe what you do for a living to a family member or a friend? If so, you’ve likely experienced their acquiescent and politely confused reaction as you articulate concepts like risk assessments, controls, tests, tolerance, appetite, key risk indicators, governance and a host of other tactics that are commonly executed as part of a practitioner’s day-to-day responsibilities. At the conclusion of your pride-filled intellectual description, you fe...
  • When Everything Old is New Again: How to Audit Artificial Intelligence for Racial Bias

    Isaca
    You may not know it, but artificial intelligence (AI) has already touched you in some meaningful way. Whether approving a loan, moving your resume along in the hiring process, or suggesting items for your online shopping chart, AI touches all of us – and in some cases, with much more serious consequences than just putting another item in your chart. As this technology becomes more widespread, we are discovering that maybe it’s more human than we would like. AI algorithms have been found to ha...
  • How Big Data Aids Cybersecurity

    Isaca
    The increasing reliance on big data and the interconnection of devices through the Internet of Things (IoT) has created a broader scope for hackers to exploit. Now both small and large businesses have an even wider surface to work on protecting. Yet, all it takes is one new trick for an attacker to penetrate even the most sophisticated firewalls in a matter of seconds. The good news is that while, on the one hand, increased reliance on big data puts businesses at risk of cyberattacks, if used...
  • Infosecurity-ISACA Conference Highlights: Hands-On Experiences and Dialogue Around Emerging Technologies, 2020 Predictions and Women in Tech

    Isaca
    Theresa Payton set the tone for the first day of last week’s Infosecurity ISACA North America Expo & Conference in New York City, delving into the multifaceted landscape of emerging technologies with the audience of information security professionals, and also sharing anecdotes from one of her most high-profile jobs, as White House CIO under the George W. Bush administration—including a story of negotiating with a cyber criminal on the dark web at her kitchen table over three nights. Thro...
  • Information Governance: You Have to Start Somewhere

    Isaca
    Deborah Juhnke, senior consultant with Information Governance Group LLC, cited a definition of information governance as “an organization’s coordinated, interdisciplinary approach to satisfying information compliance requirements and managing information risks while optimizing information.”Accomplishing all of that can be a tall order, even overwhelmingly so, acknowledged Juhnke in her session, “Information Governance – The Foundation of Information Security,” that took place today at the Inf...
  • What Do You Expect in the Next Decade of Tech?

    Isaca
    What are some of the major changes you expect to see in the technology landscape in the next decade?Join ISACA’s 50th anniversary social media campaign by providing your tech prediction for the next decade, using the image provided on the Participate page of ISACA’s 50th anniversary website and the hash tags #nextdecadeoftech and #ISACA50.The more creative the prediction, the better!Predictions are starting to roll in on social media, including these posts (pictured) forecasting the future...
  • How Blockchain is Revolutionizing the Travel and Hospitality Industry

    Isaca
    The potential of blockchain technology has inspired hype and buzz for years. However, we are really starting to see implementation in various sectors. Use cases have been extremely beneficial in industries such as banking, healthcare, and security. One such industry where the technology is gaining prevalence is travel and hospitality. Although we have not seen any full-blown disruption there just yet, this could be on the horizon. Technically, these can be considered two separate industries, b...
  • Feeling Like A Fraud: Imposter Syndrome

    Isaca
    According to the Harvard Business Review, Imposter Syndrome can be defined as "a collection of feelings of inadequacy that persist despite evident success. ‘Imposters’ suffer from chronic self-doubt and a sense of intellectual fraudulence that override any feelings of success or external proof of their competence.”Self-doubt and Imposter Syndrome tend to be thrown into the same bucket. However, as explained in the 2019 Imposter Syndrome Research Study, the key difference between the two...