RSS FeedBlogs

Infosecurity Voice


International Information Systems Security Certification Consortium, (ISC)2

Recent Posts

RSS FeedSubscribe to this blog
About Author

(ISC)² is the largest membership body of information security professionals with over 87,000 Certified members across 135 countries, and is responsible for the gold standard CISSP© certification.

In the EMEA region, it has over 13,500 members. This blog is written by John Colley and Richard Nealon, as co-chairs for the (ISC)² Europe Middle East and Africa advisory Board. Both have over 20 years of industry experience and are long-time advocates of the information security profession.

When it comes to security, don’t shoot the developer

Don't alienate development teams - communicate with them

by (ISC)²

Application and software vulnerabilities are increasingly popular routes for cybercrime. This has led to pressure on development teams to contribute to security, but most security managers don’t have a strong understanding of modern development teams, tools and practices.

December 08, 2014 12:29:00 PM Read Full Post

Ten years on - how security professionals turned from techies into leaders

Ten years of (ISC)2's Global Workforce Surveys have charted seismic shifts in the nature of the security workforce

by (ISC)²

The cybersecurity profession is changing beyond all recognition from a narrow specialism based on technology into a wide-ranging profession encompassing people, processes and policies and reaching into every area of business from training room to boardroom.

November 10, 2014 5:25:00 PM Read Full Post

The dangerous disconnect between security teams and the board

Are boards getting the advice they need?

by (ISC)²

PwC’s Global State of Information Security Survey contains a number of striking points, starting with the disconnect between the board and security teams in businesses across the globe.

October 06, 2014 11:21:00 AM Read Full Post

The cloud should be a glasshouse not a mysterious black box

If SMEs don't trust the cloud it's because they fail to do due diligence

by (ISC)²

For business the cloud too often remains a murky territory where they lose visibility over how their assets are protected and questions of security and legal liability become increasingly blurred.

September 29, 2014 11:07:00 AM Read Full Post

Privacy wars - personal data and the social contract

Gaining control of privacy is not going to be easy

by (ISC)²

Gaining control of privacy is not going to be easy If you want the sort of absolute privacy that extreme libertarians espouse, that fight is pretty much lost (unless you live in a cave and have never left it). Most people are more pragmatic: they...

July 28, 2014 6:35:42 PM Read Full Post

Consumer technologies in healthcare - what are the security challenges?

Ensuring privacy as well as clinical safety

by (ISC)²

Consumer-oriented technologies and services have already established a foothold in healthcare. If you visit a modern medical establishment you will see personal electronic devices (PEDs) being used. There may be some strictly controlled zones...

July 14, 2014 6:23:10 PM Read Full Post

The EU's 'right to be forgotten' ruling is a problem for businesses too

CISOs need to work out some processes and quickly

by (ISC)²

CISOs need to work out some processes and quickly The European Court’s (EU) recent ruling that Google must erase search results at the request of people is only the tip if the iceberg. It has spawned a host of issues surrounding ‘the...

June 25, 2014 1:38:46 PM Read Full Post

Gameover Zeus and Cryptolocker are a warning

Relief looks like being temporary

by (ISC)²

The combined and apparently heroic effort from the National Crime Agency, Europol and the FBI to take out the heart of the botnet fuelling Gameover (or GOZeus) and Crytolocker last week is a significant development. Unfortunately, it is unlikely...

June 11, 2014 6:11:43 PM Read Full Post

The eBay security breach - more lessons to learn

The consequences of the eBay breach may not be known for some time

by (ISC)²

Hot on the heels of Heartbleed (albeit a different type of security issue), the eBay data breach has yet again rocked the security world - the personal details of 145 million or more active users are in the hands of hackers. This once again...

May 23, 2014 4:14:56 PM Read Full Post

Why healthcare urgently needs certified security professionals

Data privacy governance in healthcare can quickly become a labyrinth.

by (ISC)²

Information security risks in healthcare are growing as ever greater use is made of information technology to improve care outcomes. While there are undoubtedly medical benefits to increased sharing of medical information, given the number and...

March 11, 2014 2:40:07 PM Read Full Post

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault