Top IT Security Bloggers

Isaca
  • Value Professional Networking Early in Your Career

    Isaca
    Depending on your personal interests, social skills and professional goals, professional networking may or may not be your favorite activity. Whether or not you enjoy networking, it should be a priority in your professional life – especially earlier in your career as you are building your professional network.Make Networking Part of Your Regular RoutineNetworking should not be reserved for when you are actively searching for a new job or the next opportunity. Like all relationships in your li...
  • What I Wish I Knew When I Started in IT Audit

    Isaca
    Who among us does not sometimes reflect on our journey and certain days that remain nailed to our memory, either because they were too tough to forget or too good to be true? We experience those flashbacks in certain situations, wishing that they were either handled differently, or wishing we knew something extra at the time to have had an edge. Today, I am going through one of those times, where I want to share what I wish I knew about IT audit before I became an IT auditor.Before I get into...
  • Information Security for Biomedical Devices

    Isaca
    Though device manufacturers have worked to improve the cybersecurity of their medical devices, there is still a long way to go. Improvements aside, there are distinct steps the IT information security department can take to reduce risk and improve cybersecurity for medical devices.Some notable improvements in cybersecurity for medical devices in recent years include:1. US Food & Drug Administration (FDA) guidance to manufacturers that operating system updates, especially to patch vulnera...
  • For Tech and IT Startups, Coworking Spaces Make the Most Sense

    Isaca
    When most people think about coworking spaces, they immediately picture a bunch of freelancers and solopreneurs working on independent ventures at shared desks. But coworking spaces are more versatile than this. Many technology startups actually find them to be the perfect place to launch and grow their fledgling businesses. Perhaps you will, too.What the Heck is a Coworking Space?In the simplest terms, a coworking space is a shared office space in which individuals and businesses work indepe...
  • Rising Complexity, Higher Stakes for Enterprise Risk Management

    Isaca
    Cyber risk has understandably become a focal point for enterprise risk managers, but the risk landscape is multi-layered and extends beyond the realm of cybersecurity. In addition to contending with a daunting array of cyberthreats, enterprises are determining how much risk they are willing to accept in deploying emerging technologies, working through a heightened focus on customer privacy and adjusting to changes in the regulatory environment.New industry research from ISACA, CMMI Institute...
  • Technology Emboldening Innovators on the Ground, in the Air and Beyond

    Isaca
    A future in which passengers order air taxis, victims of serious accidents tap neurotechnology to rise above limitations and AI/machine learning-fueled space exploration allows astronauts to trek deeper into the universe – for longer periods – was boldly presented on Monday, 28 October, at the Dare Mighty Things technology conference in Chicago, Illinois, USA.Envisioning the soaring progress that can be made in the coming years was the order of the day, and considering how much progress techn...
  • CISOs and CMOs – Joined At The Hip in the Era of Big Data

    Isaca
    Traditionally, an organization’s Chief Information Security Officer (CISO) and Chief Marketing Officer (CMO) haven’t had significant overlap when it comes to day-to-day roles and responsibilities. The CMO focuses efforts on brand growth and marketing strategy. The CISO, on the other hand, has been more focused on architectural efficiency, reliability and security. Today, data is the lifeblood of business. Businesses have access to copious amounts of consumer data that can be leveraged to gain...
  • Senior IT Audit Leaders Discuss Cybersecurity, Data Analytics

    Isaca
    Senior IT audit leaders met to discuss a wide variety of topics, including audit analytics, IT audit’s role in cybersecurity and incident management, and agile/DevOps shops, at the recent IT Audit Leaders Summit in Geneva, Switzerland, as part of EuroCACS/CSX 2019. Participants shared opinions and best practices, and strategized on the path forward with new technologies and business practices.The Summit kicked off with a session on Audit Analytics in a World of Change. Moderator Dietmar Hinke...
  • Securing the SWIFT Cross-Border Payment System Within Banks

    Isaca
    A series of cyber-attacks involving the SWIFT banking network have come to light in recent years. The first public report of these attacks came from the Bangladesh Central Bank, and we have also seen attacks at State Bank of Mauritius, Cosmos Bank (India) and City Union Bank (India).To strengthen security, Indian regulator Reserve Bank of India (RBI) issued several communications in this regard, and even imposed penalties on 36 banks in March for non-compliance on SWIFT operations. SWIFT also...
  • Is Your Organization Supporting Paths to Develop Women as Leaders?

    Isaca
    Is your organization supporting women in reaching leadership positions? Why is this important?A global study from the Peterson Institute for International Economics found that corporations that went from having no women in corporate leadership to 30 percent in leadership roles saw a one-percentage-point increase in net margin — which translates to a 15 percent increase in profitability for a typical firm.Having a culture that supports women growing as leaders in the organization is important...