Top IT Security Bloggers

Isaca
  • ISACA Program Connects Women Leaders in Tech

    Isaca
    One look at the faces and names of industry speakers, writers and influencers shows a relative dearth of female contributors. The same can be seen throughout the global technology workforce. The reality of too few women entering technology fields and moving up the ladder to leadership positions is not a new one, but it is something that the ISACA Women’s Leadership Council is actively addressing through a new program called Connecting Women Leaders in Technology. The empowerment of women with...
  • Intel Security’s CTO: Achieving Better Efficiency in Security

    Isaca
    ISACA Now recently had a virtual sit-down interview with Brett Kelsey, vice president & chief technology officer for the Americas, Intel Security Group. Kelsey shared his thoughts on the biggest single information security (InfoSec) challenge that organizations face today, how to solve the InfoSec labor shortage and other critical issues he deals with on a daily basis.As a keynote speaker at CSX 2016 North America 17-19 October in Las Vegas, Kelsey will reveal how the industry is under du...
  • Detroit Chapter Hosts Student Cybersecurity Competition

    Isaca
    Editor’s note: ISACA’s Detroit Chapter recently sponsored its third annual Cybersecurity Scholarship Case Competition, which saw 25 students vying for $13,500 in prize money at the University of Detroit Mercy. Michael Talamonti, a Lawrence Technological University Masters of Science in IT student, was part of a winning team for the second consecutive year. Here is Talamonti’s account of the competition:Participants in the ISACA Detroit Chapter’s Cybersecurity Scholarship Case Competition were...
  • Top Scorer Asks: Are You Ready for the CISM Exam?

    Isaca
    Are you interested in becoming a Certified Information Security Manager (CISM)? If so, are you ready for the exam?The CISM exam is demanding, and it will be difficult to pass without adequate preparation. But realistic expectations and a reasonable plan can help.I recently earned a CISM Worldwide Excellence Award for achieving the highest score in the world on the December 2015 CISM examination, and this is my advice based on that experience:Start early. Review the information security mana...
  • CSI: Cyber Creator Suggests Solutions to Skills Gap

    Isaca
    ISACA Now recently talked to Anthony Zuiker, creator of the global television phenomenon CSI, including CSI: Cyber. Zuiker will present a 2016 CSX North America keynote address at the conference, which takes place in Las Vegas from 17-19 October.  Zuiker is one of the most creative and multifaceted storytellers today. Bridging the gap between Silicon Valley and Hollywood, he entertains and educates global audiences on the threat of cybercrime through a major online storytelling experience, Cy...
  • Krebs: Ransomware Getting More Targeted, Expensive

    Isaca
    Editor’s note:  The following is an excerpt of a recent blog by Brian Krebs that first appeared in KrebsonSecurity.com. Krebs is an investigative journalist, founder of Krebs on Security, and a former Washington Post reporter with a passion for computer security. He will be the opening keynote speaker at CSX 2016 North America, which takes place in Las Vegas 17-19 October. Krebs will share unique insights gained from years of research and writing, as well as his unprecedented access to some...
  • Always Check the Boxes!

    Isaca
    “Don’t just check the box!” Chances are you have said or heard this phrase at some point in your career. In case you are not familiar with the term, it refers to a mechanical, “bare minimum” way of doing things. Sometimes it means simply not being creative in your approach. As I will explain, checking the box can actually be a very good strategy to uncover problems, especially if you are in a control assurance function. More precisely, I will call my strategy “Check the boxes.” Let me take yo...
  • Firmware - The New Target

    Isaca
    I understand the stress of information security management. The stakes are high, our methodologies are continuously questioned and evolving—and rightly so. And yet our customers/stakeholders/employees/executives/families wonder why we haven’t solved that whole cyber security thing yet. My goal in this post is to highlight an area of vulnerability management that is still around the corner, for some. Think of this as a heads-up. I’ll be speaking about this topic—and releasing brand-new data fr...
  • Growing Your Career: Critical Questions to Ask When Considering a New Role

    Isaca
    In my previous post, The Demand For Talent: Hidden Risks to Security Professionals, I wrote about the highly publicized demand for security professionals along with the lesser-known risks that come with it. While there are more opportunities for security professionals than ever before, it is important to understand why this is occurring. From a big picture perspective, there are three major reasons one can point to.Three Key Reasons for Rising Demand for Security Pros The first is an increas...
  • Non-auditors: Is There Value in Becoming a CISA?

    Isaca
    Should non-auditors become Certified Information Systems Auditors (CISA)? Being a CISA can change your approach to work, not only helping your career but also your enterprise. Here’s why:  To ensure internal and external stakeholder satisfaction and thereby contribute value to the business, IT plays a vital role in realizing business benefits, where the proper competencies of IT staff is critical to delivering business tasks.  CISA is the most popular ISACA certification. The demand for CISA...