RSS FeedBlogs

Infosecurity Voice


International Information Systems Security Certification Consortium, (ISC)2

Recent Posts

RSS FeedSubscribe to this blog
About Author

(ISC)² is the largest membership body of information security professionals with over 87,000 Certified members across 135 countries, and is responsible for the gold standard CISSP© certification.

In the EMEA region, it has over 13,500 members. This blog is written by John Colley and Richard Nealon, as co-chairs for the (ISC)² Europe Middle East and Africa advisory Board. Both have over 20 years of industry experience and are long-time advocates of the information security profession.

UK and US plan cyber games - really?

Headline-grabbing perhaps but short on substance

by (ISC)²

David Cameron’s headline-grabbing accord with Barack Obama to enhance cyber defences amounts to little more than acknowledgement of a huge problem. Clearly, in the wake of the terror attacks on Paris and the use of cyberspace by terrorists, the two leading political leaders needed to put cyber security high on their summit agenda last week.

January 22, 2015 1:58:00 PM Read Full Post

How can SMEs afford security that is good enough?

Security is too often seen as an anxiety for the specialists

by (ISC)²

SMEs have the same security concerns and requirements as their much larger partners, but, how can they afford security that can adequately protect them?

January 05, 2015 11:31:00 AM Read Full Post

When it comes to security, don’t shoot the developer

Don't alienate development teams - communicate with them

by (ISC)²

Application and software vulnerabilities are increasingly popular routes for cybercrime. This has led to pressure on development teams to contribute to security, but most security managers don’t have a strong understanding of modern development teams, tools and practices.

December 08, 2014 12:29:00 PM Read Full Post

Ten years on - how security professionals turned from techies into leaders

Ten years of (ISC)2's Global Workforce Surveys have charted seismic shifts in the nature of the security workforce

by (ISC)²

The cybersecurity profession is changing beyond all recognition from a narrow specialism based on technology into a wide-ranging profession encompassing people, processes and policies and reaching into every area of business from training room to boardroom.

November 10, 2014 5:25:00 PM Read Full Post

The dangerous disconnect between security teams and the board

Are boards getting the advice they need?

by (ISC)²

PwC’s Global State of Information Security Survey contains a number of striking points, starting with the disconnect between the board and security teams in businesses across the globe.

October 06, 2014 11:21:00 AM Read Full Post

The cloud should be a glasshouse not a mysterious black box

If SMEs don't trust the cloud it's because they fail to do due diligence

by (ISC)²

For business the cloud too often remains a murky territory where they lose visibility over how their assets are protected and questions of security and legal liability become increasingly blurred.

September 29, 2014 11:07:00 AM Read Full Post

Privacy wars - personal data and the social contract

Gaining control of privacy is not going to be easy

by (ISC)²

Gaining control of privacy is not going to be easy If you want the sort of absolute privacy that extreme libertarians espouse, that fight is pretty much lost (unless you live in a cave and have never left it). Most people are more pragmatic: they...

July 28, 2014 6:35:42 PM Read Full Post

Consumer technologies in healthcare - what are the security challenges?

Ensuring privacy as well as clinical safety

by (ISC)²

Consumer-oriented technologies and services have already established a foothold in healthcare. If you visit a modern medical establishment you will see personal electronic devices (PEDs) being used. There may be some strictly controlled zones...

July 14, 2014 6:23:10 PM Read Full Post

The EU's 'right to be forgotten' ruling is a problem for businesses too

CISOs need to work out some processes and quickly

by (ISC)²

CISOs need to work out some processes and quickly The European Court’s (EU) recent ruling that Google must erase search results at the request of people is only the tip if the iceberg. It has spawned a host of issues surrounding ‘the...

June 25, 2014 1:38:46 PM Read Full Post

Gameover Zeus and Cryptolocker are a warning

Relief looks like being temporary

by (ISC)²

The combined and apparently heroic effort from the National Crime Agency, Europol and the FBI to take out the heart of the botnet fuelling Gameover (or GOZeus) and Crytolocker last week is a significant development. Unfortunately, it is unlikely...

June 11, 2014 6:11:43 PM Read Full Post

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault