Top IT Security Bloggers

Isaca
  • Blockchain: The Glue That Binds the Internet of Things

    Isaca
    One of the hottest emerging technology topics surrounds the Internet of Things (IoT), or as some have characterized it, the Internet of Everything. A McKinsey Global Institute report estimates that by 2025, the global financial impact of the IoT could reach between $3.9 trillion to $11.1 trillion a year. Every industry will potentially benefit from this technology that relies on small sensors communicating among themselves and providing data that will drive exceptionally huge big data. Smart...
  • Fishing vs. Hunting for an IT Assurance Job

    Isaca
    The Internet is awesome, isn’t it? At any moment, you have the ability to see hundreds of job postings and post your resume for all to see. However, if the only thing you are doing to find a job is fishing by dropping your resume “lure” in the water hoping for a hiring manager to bite, you will be waiting a while. You need to get out and hunt for your next job. Know the terrain, have spotters in the field, pick the right tree to sit under. Truth be told, I know nothing about actual hunting bu...
  • Ten Things Auditors Need to Know About Cyber Security

    Isaca
    We live in an age when social media, mobile devices and the Internet of things (IoT) dictate how we access, manage and communicate information. This technology is constantly changing and relatively complex in nature. Thus, it is essential that enterprises have a fully functional and effective information security program.The responsibility to ensure such a program is properly implemented resides with senior management. The main objectives of such a program are to ensure the confidentiality, i...
  • Tech Certifications Are Earning Cash Premiums, and Info/Cyber Security Certs Are the Hottest

    Isaca
    Why would an employer pay its tech workers extra cash for a skill or certification if they're already getting a salary and annual bonus?There are a dozen good reasons why, and they all share one thing in common: None would be necessary if the company's compensation structure and pay practices were agile enough to successfully compete for talent in volatile labor markets. The nature of the tech labor marketplace is exactly that, where the market value of a job or skill can move like a roller c...
  • Containerization: Why You Should Prepare Now

    Isaca
    There are some technologies that seem to have their own “gravitational pull.” By this, I don’t just mean technologies that are interesting, compelling to the business, or likely to be considered by businesses. Instead, I’m referring to those technologies that exert a steady, near-continuous and (one might argue) irresistible pressure across multiple areas of the organization to adopt.Cloud, mobile, and social media are all examples of technologies like this. Say “no” to the sales team’s reque...
  • CSX Europe Illuminates Key Cyber Security Insights and Advancements

    Isaca
    ISACA’s inaugural CSX Europe conference convened last week in London, and I had the privilege of serving as emcee. During a panel discussion on the second day of the conference, Mark Sayers of the UK’s Cabinet Office discussed the announcement that morning of the UK Government’s £1.9bn investment in a national cybersecurity strategy—a strategy that makes clear the UK’s preparedness for cyber attacks and will include a cyber security skills strategy. Sayers made it clear that organizations like...
  • The Future of COBIT—We Need Your Input

    Isaca
    It is time to consider the next evolution of the COBIT framework beyond 5.0—and here is your chance to play an important role.As you are well aware, COBIT is the premier IT governance framework, helping organizations around the world realize significant value. ISACA is seeking your help to ensure that COBIT continues to evolve as a vibrant framework that encompasses the new capabilities and threats (Internet of Things, big data, cyber security, DevOps, etc.) constantly arising in the world of...
  • The Path to a Cyber Security Governance Career

    Isaca
    Cyber security governance jobs are growing significantly faster than information technology jobs. However, this very exciting industry lacks the number of skilled professionals required to fill the available jobs.Some common roles within cyber security include cyber security governance manager/consultant, information assurance, security analyst, forensics consultant, penetration tester and malware analyst/reverse engineering. With these types of opportunities available, new or aspiring cyber...
  • Cynjaspace Dojo App Explains Internet to Kids

    Isaca
    Magic! It is the basis for countless children’s stories filled with adventure and excitement. It is also how many kids think cyberspace works. There is nothing like seeing our child’s reaction when the slight of a magician’s hand produces awe-inspiring results. However, as IT professionals we know the internet is no Penn & Teller illusion. A technical understanding of their digital lives is a crucial life lesson for today’s youth.How many of the kids in our lives truly know what mom or da...
  • Riyadh Chapter Member Shahab Shares CGEIT Success Story

    Isaca
    Syed Adnan Shahab, CGEIT, TOGAF9, PMP, ITIL v3 Expert, CISSP, CISA, CRISC, CISM, CCSP, Riyadh Chapter, recently shared his CGEIT certification success story with ISACA Now in a question and answer session.ISACA Now:  Tell us about yourself.Shahab:  For the past ten years I have worked as an enterprise architect (EA) with various government agencies to establish an EA framework and practices in order to align IT with the business and proactively manage disruptive changes across the enterprise....