Top IT Security Bloggers

Isaca
  • 5 Reasons Why all Businesses Are Technology Companies

    Isaca
    Despite the enormous growth of mobile computing, constantly connected consumers, and the flexibility and seamlessness of cloud computing, some businesses still see the technology part of their organization as a separate entity from the rest of the enterprise.The days of this approach are numbered, as today all businesses are technology companies. Think about some of the most successful and innovative businesses of the past decade. Is Amazon an e-commerce company or a technology company? How a...
  • Shadow IT: What Is It and Is It Really Risky?

    Isaca
    These days, if you want an application for something and you don’t have it already installed, it is pretty easy to get it within minutes from the internet. No company credit card? No problem, you can probably find a free or trial version.Locked down desktop? No problem, use it as a remote cloud service through your browser, or there might even be something that can bypass the administrative permissions...Even if you think you have the most secure data loss prevention and device management pr...
  • Win the Cybersecurity Battle With Effective Access Controls

    Isaca
    Maintaining cybersecurity programs within organizations of all sizes and within all industries has become a lot more challenging. According to Dark Reading, the global cost of cybercrime is predicted to hit $6 trillion by 2021. Companies will continue to suffer data and financial loss, fraud, business disruptions and more due to hackers gaining unauthorized access. The cyberattack surface continues to expand thus increasing the need for more diligent and effective access controls.The securit...
  • Technology Futurist Talks Disruption, Risks of an ‘Always-On’ Society

    Isaca
    Technology Futurist and Information Risk Consultant Simon Moores believes the world is currently occupying a vulnerable moment between two technology waves in the information security space. It is just one important issue Moores explored in a recent virtual conversation with ISACA Now.Moores will present 'The Time has Come' - Cybersecurity in the 21st Century as the closing keynote speaker at the inaugural CSX 2016 European Conference in London 31 October – 2 November.As a frequent advisor t...
  • CSX Euro Speaker: Human Factor Critical Part of Cyber Security

    Isaca
    ISACA Now recently had a virtual sit-down with Misha Glenny, an investigative journalist, author and broadcaster specializing in global organized crime and cybersecurity. Glenny will be a keynote speaker at the inaugural CSX 2016 European Conference in London 31 October – 2 November. Glenny will present The Human Factor: Cyber Security is Made Out of People at the conference 1 November.Glenny is one of the world’s leading experts on cybercrime and global mafia networks. He is an associate pro...
  • Top CRISC Scorer Reveals Exam Prep Tips

    Isaca
    For the June 2015 CRISC exam I had the highest score in the world. ISACA asked me to tell the story of how I prepared for the exam. Here is my story. I hope it will be of help for other students.First of all it is important to know that I passed my CISA exam in 2013 with a high score. As there is some overlap in the topics to study it was of great help to me that I already had that certification. In 2014 I passed the CRMA certification, which was also of help because it gave me a thorough kno...
  • CSX Europe: Raj Samani Talks Ransomware, Being a CTO

    Isaca
    At the inaugural CSX 2016 European Conference in London 31 October to 2 November, Raj Samani, Intel Security’s chief technology officer (CTO) of EMEA, and special advisor for the European CyberCrime Centre (EUROPOL), will provide his unique perspective as a participant supporting actual criminal enterprise takedowns, on who the bad actors are—their tactics, techniques and targeting mechanisms, and how to win the battle against them.ISACA Now recently had a virtual sit-down with Samani to disc...
  • Questions to Ask Yourself Before Pursuing the CISA Designation

    Isaca
    Before I pursued the Certified Information Systems Auditor (CISA)designation, I wish I would have ____________________.I recently posed that question to a number of candidates who had pursued the CISA (Certified Information Systems Auditor) designation. As the responses poured in, I identified 5 questions which, if answered early in the pursuit process, could help future candidates avoid uttering that same “wish I would have” statement. So to future CISA pursuers, take a moment to ask yours...
  • Process Improvement for Management of IT-related Processes

    Isaca
    Most organizations have objectives for quality and improvement. Enterprises want employees to continually look for opportunities that fuel effectiveness and strengthen the company. The improvement theme is both a nice to have and a basis to survive, providing a direction to get better and a model for personal behavior and work culture. The basic improvement model is one of common sense, similar to those used in psychology and coaching. It can be teamed with any process reference model.The imp...
  • CISA Exam Prep Course on VILT set for 30 August-1 September

    Isaca
    Today’s IT auditor needs to have strong analytical skills and a broad general knowledge of technology, along with an understanding of the auditing process. They also need to know about organizational business processes and the technology that supports those processes to effectively assess risk and articulate it in common business language. Unfortunately, the most knowledgeable and experienced candidate may fail in his or her assignment if they do not possess exceptional soft skills.The most i...