Top IT Security Bloggers

Isaca
  • Cybercrime Can Put Reputation of Enterprises At Stake

    Isaca
    Worldwide, organizations are concerned about cybercrime – but not necessarily for the reasons most would think. While many organizations worry about the technical issues that are posed by a cybercrime attack, such as ransomware locking up entire swaths of servers – bringing business operations to its knees – most are even more concerned about their public perception and loss of clientele.  In fact, while an attack or exploitation by a cybercriminal may be technically damaging to an organizati...
  • New COBIT 5/CMMI Tool Goes Beyond Traditional Mapping

    Isaca
    ISACA and CMMI each have a deep well of expertise and rich sources of guidance and leading models in the areas they cover: ISACA in the world of governance of enterprise IT (GEIT) with COBIT, and CMMI in the world of enterprise process maturity.Together, we have teamed up to create a new product that leverages the deep guidance available within each of the models. Specifically, COBIT 5 and the CMMI maturity models each have extensive guidance in establishing practices that permit users to bet...
  • How to Win the IT Advisory Talent Battle

    Isaca
    Demand never has been higher for the IT advisory skill set. At our firm, we’re seeing more competition now than even existed in the SOX boom of the mid-2000s. Positions across the United States are re-maining open for months at a time. Your company wants to make sure it’s not settling on the first ap-plicant who knows the difference between CISA and COBIT and, instead, wants to attract the brightest talent that will really make a difference to your team. We’ve seen some common themes among ou...
  • Resilience and Security Risk Management in the Future of the IoT

    Isaca
    The IoT, or “Internet of Things” (everyday objects and systems that have connections to a network to provide data-sharing and virtual control), is a fast-growing arena of technology growth. The potential uses of the IoT to build a “smart world” of connected devices is enormously convenient and brings a whole new level of mobile management to every aspect of consumer and business activities. We are now able to start our cars from our phone, lock our front doors from our PC, or turn on the crock...
  • Member Profile: Johnson’s Interest in AI Has Come ‘Full Circle’

    Isaca
    Claudia Johnson always has had a knack for mathematics and statistics.But even Johnson has trouble calculating the exact impact artificial intelligence and robotics will make on society. Her background qualifies her well to at least estimate.“The opportunities through artificial intelligence and machine learning, particularly for security, are enormous,” Johnson says.Johnson, an ISACA member and security specialist at Infoblox, spent about six years researching AI early in her career. She h...
  • New NIST-Based Audit/Assurance Program Validates Cyber Controls

    Isaca
    We live and work in a high-tech, interconnected world that is seeing increases in the volume and sophistication of cyberattacks. In order to function safely in this technology-driven, digital world, we must have strong cybersecurity controls. But how do we know if we have the right controls or if our controls are functioning as planned?Because of the need for audit and assurance programs and processes around cybersecurity, ISACA has developed a new IS audit/assurance program, Cybersecurity: B...
  • Teaching Smart Gadgets Privacy Manners

    Isaca
    The Internet of Things (IoT) is quickly becoming a highly populated digital space. Two popular types of IoT items are the Amazon Echo personal helper, that answers to “Alexa” (or “Echo” or “Amazon”), and the Google Home personal helper, that responds to “OK” (or “Google”). These highly proclaimed smart gadgets are always listening; as are generally all similar types of smart gadgets and toys. Listening can quickly change to recording and storing the associated files in the vendors’ clouds bec...
  • Talking it Out: Millennials, Certifications and Careers (part two)

    Isaca
    Editor’s note: ISACA Now recently moderated a conversation among a trio of millennials to discuss topics including professional development, networking, certification and how their generation differs from others when it comes to career priorities and workplace dynamics. The first portion of the conversation can be read here. The following is the second installment of the two-part conversation – edited for length and clarity – between Ashley Spangler, CISA, CISM, CRISC, SunTrust Banks, Inc., AV...
  • Talking it Out: Millennials, Certifications and Careers

    Isaca
    Editor’s note: ISACA Now recently moderated a conversation among a trio of millennials to discuss topics including professional development, networking, certification and how their generation differs from others when it comes to career priorities and workplace dynamics. The following is the first installment of the two-part conversation – edited for length and clarity – between Ashley Spangler, CISA, CISM, CRISC, SunTrust Banks, Inc., AVP Information Security; Leigh Ann Montgomery, CISA, Solut...
  • Work Hard, Have Fun and Learn with New CISA Online Review Course

    Isaca
    At the very end of his 2010 speech at the iPad's debut, Steve Jobs mused on the secret to Apple's success: “It’s in Apple’s DNA that technology alone is not enough. It’s technology married with liberal arts, married with the humanities, that yields the results that make our hearts sing.”1Now I’m not foolish enough to even begin to compare myself to Steve Jobs, but I do know a thing or two about technology, and I have updated the CISA Review Manual for the new 2016 job practices. I also was pa...