Top IT Security Bloggers

Isaca
  • Cyber Security Workforce Challenges Require Broader Collaboration

    Isaca
    Report after report highlight that there is a gap between the number of skilled cyber security professionals in the workforce and the number of job vacancies.What is needed to begin to bridge that gap is an increased focus combining education and experience with both federal and private sector job markets.While this has been a difficult combination to obtain in the past, more and more countries are seeing the need for and instituting programs to fill the gap and stack their bench.In the Un...
  • 7 Things That Make Every Website Safer for Customers

    Isaca
    Your website needs to be well-designed, functional, and aesthetically reflective of your brand. But — don’t forget—it also needs to be safe. Website security is a vital path of development that makes your data less vulnerable to cybercriminals, and increases the security of your customers’ financial transactions. You’ll also prevent the possibility of a massive consumer data breach—like the one faced by Target a few years back, which cost the company $39 million and even more in lost consumer...
  • Steps To Kick-Start Your Technical Skill Development Plan Now

    Isaca
    Senior IT Auditor, Fortune 500 global manufacturing organization: “I joined a Big 4 firm advisory practice out of college, did two years, and then moved over to IT Internal Audit a year ago. Information security is my next goal. When I look at information security job postings, they all seem more technical than my current skill set, which is heavily ITGC focused. What should I do to build skills that will be marketable to information security?”IT Audit Director, large financial services compa...
  • Faces of ISACA: Meet Jason Duke, CISA, CISM, CSXP

    Isaca
    ISACA Now: You’re Southeast Region Geographic Information Systems Coordinator with the U.S. Fish & Wildlife Service; Partner at White Mile Consulting, LLC; and an adjunct professor at Tennessee Technological University – where do you find time for all of that?JD: I have always been a strong proponent of time management. I work four 10-hour-days with the U.S. Fish & Wildlife Service in a role where I lead our Geographic Information Systems (GIS) program in the southeastern U.S. and the...
  • IT Careers = Money, Advancement and Job Satisfaction. Why Aren’t More Women Pursuing Them?

    Isaca
    The rewards of a career in information technology include above-average compensation, advancement opportunities, intelligent peers and job satisfaction. Employers, to attract and retain talent, have become increasingly flexible about alternate schedules, remote work and family leave—benefits that appeal to many women.If we look at trends during the past decade, women have not gravitated toward information technology in the increasing numbers that one might expect from an industry that offers...
  • A Digital Payment Case Study - India Goes Hi-Tech

    Isaca
    A few months ago, on 8 November 2016, an unexpected announcement jolted the Indian nation. In a nationally televised address, the Prime Minister of India, Mr. Narendra Modi, announced the demonetization of rupees 500 and rupees 1,000 currency notes. This meant that the currency notes would no longer be considered as legal tender. The rupee 500 and rupee 1,000 notes at the time of demonetization represented more than 86 percent of the total value of currency under circulation. Withdrawal of s...
  • Auditors Play Prominent Role in Effective Cyber Security

    Isaca
    As the business benefits from technology grow rapidly, so do related risks. The ability to communicate and interact with remote stakeholders seamlessly requires points of entry into the enterprises network that would otherwise not be present. Such entries could result in vulnerabilities for organization that should be identified and assessed. In like manner, the identification and assessment of threats that could potentially exploit such vulnerabilities is also necessary. Once there has been...
  • Organizations Must Be Smart, Strategic in Pursuit of Cyber Talent

    Isaca
    Organizations are understandably concerned about how difficult and time consuming it is to find quality cyber security talent. While the fundamental causes of this skills crisis will take time and sustained focus to effectively address, there are steps that organizations can take in the short term to better position themselves to deal with their challenges.In ISACA’s State of Cyber Security 2017 study, 37 percent of respondents say less than one in four applicants are qualified for jobs, whil...
  • How SOC Brings Value to the Business

    Isaca
    Most organisations, after being impacted by a cyber-attack, began looking at the design of their Security Operations Center (SOC) operating model – their existing engagement with the managed service provider or their in-house SOC program – to identify the missing link because business challenged their effectiveness. This is a reality.Here is my perspective on how your SOC program can establish this effectiveness proactively and bring value to the business through a couple of measures, though...
  • IoT Device Manufacturers Must Take Steps to Earn Trust from Professionals, Consumers

    Isaca
    More than four in five global IT professionals (82 percent) see vulnerabilities in Internet of Things (IoT) devices as significant security concerns for organizations.Those concerns, highlighted in ISACA’s annual IT Risk/Reward Barometer, are reflective of insufficient security measures by IoT device manufacturers.One of the main culprits is IoT devices running old versions of Linux – sometimes as much as 10 years old. This happens for a variety of reasons, such as the version becoming outda...