Date | Title | Description |
13.06.2025 | Top 5 Skills Entry-Level Cybersecurity Professionals Need | Image: Envato/s_kawee
Investing in junior and intermediate-level employees can strengthen cybersecurity teams, nonprofit professional organization ISC2 found in its survey of cybersecurity hiring trends.
In addition, despite global economic... |
12.05.2025 | New Training Programme Seeks to Bridge Cybersecurity Gender Gap | Enrolment is now open for the She@Cyber programme, a new Erasmus+ training initiative designed to help close the gender gap in cybersecurity by equipping women and other underrepresented groups with practical, beginner-friendly digital skil... |
16.04.2025 | New Open Letter Urges Swift Audit Reform for UK Digital Resilience | A new open letter has been sent to Rt Hon Jonathan Reynolds MP, secretary of state for business and trade, stressing the urgent need for audit reform legislation to boost digital resilience in the UK.
The letter underlines stakeholder suppo... |
28.03.2025 | The Digital Dilemma: Nigeria's Data Cost Crisis and the Call for Change | In Nigeria, the internet is more than a luxury; it’s a lifeline. It connects people to opportunities, education, and the global economy. Yet, a storm is brewing. The recent surge in data costs has left many Nigerians gasping for air. The Se... |
27.03.2025 | Building a safer digital future: Enuma Edmund leads the charge in cyber awareness and AI-powered defense | Edmund Enuma
In today’s digital age, cyber threats and attacks are becoming more sophisticated putting individuals, businesses, and even entire nations at risk. Cybersecurity threats encompass malicious activities aimed at gaining unauthori... |
05.02.2025 | Phoenix Cyber Appraised at CMMI Level 3 | Phoenix Cyber, a provider of consulting services to the federal government, has been appraised at level 3 of ISACA’s Capability Maturity Model Integration.
This milestone reinforces our commitment to delivering exceptional value to our fede... |
29.01.2025 | ISACA Introduces Certified Cybersecurity Operations Analyst Credential | ISACA’s State of Cybersecurity survey report found that the two top factors for determining qualified candidates for jobs are prior hands-on experience (73%) and credentials held (38%).
To help employers find qualified candidates and help c... |
22.01.2025 | The Shadow of Shadow IT: Navigating the Hidden Risks in Corporate Technology | In the modern corporate landscape, technology is both a boon and a bane. The rise of Shadow IT—applications and systems used without the IT department's knowledge—has become a double-edged sword. It offers agility but invites chaos. The cor... |
21.01.2025 | Privacy Budgets Set to Decrease in 2025, According to ISACA | More than two in five (45%) privacy professionals in Europe believe that their organisation’s privacy budget is underfunded.
This marks an increase from 41% in 2024 – and more than half (54%) expect budgets to decrease further in 2025. That... |
19.01.2025 | Аудит Shadow IT | Теневые ИТ (Shadow IT) — это те ИТ, которые появляются в компании, минуя ИТ департамент, в том числе самописки, сложные системы макросов, парсеры, сторонние ноутбуки, флешки, смартфоны. Большой новый класс Shadow IT – это ИИ помощники, испо... |
06.01.2025 | ISACA: Majority of Companies Lack Women in Tech Programmes | The majority (87%) of IT professionals agree that there is a lack of gender diversity in the sector, yet less than half (41%) of businesses have programs in place to hire more women, according to new research from ISACA, a professional asso... |
10.12.2024 | Cybersecurity News Round-Up 2024: 10 Biggest Stories That Dominated the Year | This year has not been quiet for the cybersecurity field. We have seen record-breaking data breaches, huge ransomware payouts, and illuminating studies about the impact of the increasingly complex and ever-evolving threat landscape.
As we a... |
01.11.2024 | Как закрыть критерий «Членство в ассоциации» IT-специалисту для визы таланта | Рассказываю в шагах, как вступить в профильную ассоциацию и усилить кейс для визы. Также в конце оставила подборку, которой сама пользуюсь. Отрываю от сердца.
У каждой страны свои требования и условия программы, но критерий публичности есть... |
24.10.2024 | Cyber Teams Left Out of AI Implementation, ISACA Says | Only 35% of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, new ISACA research shows.
Further, nearly half (45%) report no involvement in the development... |
17.10.2024 | Деловые игры рыцарей круглого стола | Как мы здесь оказались
В прошлой статье была затронута тема такого формата взаимодействия для задач, как деловые игры. На самом деле, и у нас, как у компании, и у некоторых наших сотрудников есть своя история и свой опыт в участии и проведе... |
11.10.2024 | 9 Essential Features of a Modern Outsourced Security Operations Centre | In the ever-evolving world of cybersecurity, success is often measured by the absence of incidents: the breaches prevented, the attacks thwarted, and the data secured. But achieving this level of protection requires a delicate orchestration... |
09.10.2024 | Bridging the Gap: The New Era of Hybrid IT and Human Risk Management | In the digital age, businesses face a dual challenge: managing complex hybrid IT environments and mitigating human risk in cybersecurity. Two recent developments highlight these issues. SolarWinds has launched an updated version of its Obse... |
09.10.2024 | Security Awareness Training is Not Alleviating Breach Risk | Human Risk Management Platform CultureAI‘s new research has unveiled that companies are pouring an increasing number of resources into their security awareness and training (SA&T) programmes.
Ninety-six per cent of respondents allocate ... |
07.10.2024 | Should You Ever Pay a Cyber-ransom? | The Counter Ransomware Initiative (CRI), in collaboration with key insurance bodies, has released updated guidance for organisations dealing with ransomware attacks.
As ransomware incidents become more complex and widespread, this guidance ... |
07.10.2024 | Australian Cybersecurity Professionals Confess To Growing Job Stress | Sixty-four percent of Australian cybersecurity professionals say their role is more stressful now than it was five years ago, according to a new survey by global professional association ISACA.
The 2024 State of Cybersecurity, which surveye... |
04.10.2024 | Australian cybersecurity roles increasingly stressful, says ISACA survey | A recent survey by ISACA has revealed that 64% of cybersecurity professionals in Australia regard their roles as being more stressful than it was five years ago. The report, the 2024 State of Cybersecurity, highlights that stress levels amo... |
02.10.2024 | The Cyber Resilience Paradox: A Call to Action for Businesses | In a world where digital threats loom large, businesses find themselves at a crossroads. A recent survey by PwC reveals a startling truth: only 2% of firms have achieved full cyber resilience. This statistic is a wake-up call. It’s a clario... |
02.10.2024 | Cyber Resilience: The Thin Line Between Preparedness and Vulnerability | In the digital age, cyber resilience is not just a buzzword; it’s a necessity. Yet, a recent survey reveals a startling truth: only 2% of firms have fully embraced this critical strategy. This statistic is a wake-up call. It highlights a si... |
01.10.2024 | Only 2% of Firms Have Full Cyber Resilience | Almost four-fifths (77%) of organisations expect their cyber budget to increase over the coming year, according to PwC’s 2025 Global Digital Trust Insights survey.
The survey, polling over 4,000 business and tech executives across 77 countr... |
01.10.2024 | ISACA Report: Cybersecurity Teams Understaffed & Underfunded | Cybersecurity teams are under strain, as 61% of European cybersecurity professionals say that their organisation’s cybersecurity team is understaffed, and over half (52%) believe that their organisation’s cybersecurity budget is underfunded... |
19.09.2024 | Top Cybersecurity Courses Online You Should Take in 2024 in Australia | Share
Tweet
Share
Share
Email
As we continue to advance in the digital age, the importance of cybersecurity cannot be overstated. In 2024, safeguarding digital assets has become a top priority for both individuals and organizations. The fre... |
10.09.2024 | ACS & ISACA extend partnership to boost IT skills in Australia | ACS (the Australian Computer Society) and ISACA, the global association for IT audit, governance, risk, and cybersecurity professionals, have extended their Memorandum of Understanding (MoU) in a concerted effort to address the global IT sk... |
27.08.2024 | TRYFACTA, INC. - IT Staffing and Professional Services Division was appraised at CMMI Maturity Level 3
USA - English | CMMI APPRAISED MATURITY LEVEL 3
Designation reinforces Tryfacta's commitment to continued improvement and consistent quality of internal processes
PLEASANTON, Calif., Aug. 27, 2024 /PRNewswire-PRWeb/ -- Tryfacta, Inc. today announced that i... |
27.08.2024 | Tech experts and AI innovators to congregate at Tech Week Singapore 2024 this October | Senior executives from OpenAI, NVIDIA, Google, AI Singapore and IMDA will headline this year's main stage
SINGAPORE, Aug. 27, 2024 /PRNewswire/ -- CloserStill Media, a global producer of market-leading events, has announced the return of Te... |
07.08.2024 | Where Will AI Have the Most Positive Impact? | Sixty-two percent of respondents to ISACA’s recent 2024 AI Pulse Poll believe AI will have a positive impact on audit/assurance in the next year – the highest number compared to other domains like risk, compliance, security, IT strategy/gov... |
30.07.2024 | Deltek Announces C-Level Appointments Focused on Furthering Innovation and Customer Success | Margo Martin Promoted to Chief Customer Officer; Rebecca Harness Appointed Chief Information Security Officer
HERNDON, Va., July 30, 2024 /PRNewswire/ -- Deltek, the leading global provider of software and solutions for project-based busine... |
08.07.2024 | Sidestepping AI's Pitfalls: The Unforeseen Implementation Risks | TRC3 PRS 1
The genie is out of the bottle, with AI poised to grant the wishes of every competitive enterprise with efficiency, profit, and growth. However, relying on the promises of nascent technology heedless of its potential pitfalls can... |
05.07.2024 | What Are Tech Leaders Saying About the Election Results? | Sir Keir Starmer has led the Labour Party to a landslide victory and will take over from Mr Sunak as the UK’s prime minister.
Accepting responsibility for the result, Mr Sunak said he heard voters’ “anger” at his government following the Co... |
27.06.2024 | Wind River Corporation Wind River Professional Services receives CMMI Level 3 certification for software development process | Wind River Corporation
Wind River Professional Services Receives CMMI Level 3 Certification for Software Development Process
……
June 12, 2024 – Alameda, California – Wind River (*1), a global leader in providing software for the intelligent... |
27.06.2024 | Wind River Corporation Wind River Professional Services receives CMMI Level 3 certification for software development process | - |
25.06.2024 | Career Paths for Information Security Analysts: Opportunities and Growth | Share
Tweet
Share
Share
Email
The digital age has ushered in unprecedented opportunities for businesses and individuals. However, with these opportunities come significant risks, particularly in the realm of information security. Informatio... |
18.06.2024 | TurningPoint Software Development Projects Re-Appraised at CMMI Maturity Level 5 for DEVELOPMENT V3.0 | CMMI Maturity Level 5 Dev 3.0
Turning Point Global Solutions LLC (TurningPoint), a leading software engineering and information technology (IT) professional services firm, today announced that it has once again been appraised at Maturity Le... |
17.06.2024 | ECSF — европейская система навыков кибербезопасности | Завершая небольшую серию материалов о моделях компетенций в ИБ, нельзя не рассказать о самой молодой и компактной из них — ECSF, впервые представленной на 1-й конференции ENISA по кибернавыкам в сентябре 2022 года. ECSF обобщает роли, связа... |
14.06.2024 | Data Ethics 101 | The term “data ethics” refers to a set of guidelines that ensure data collection, use, and management processes respect privacy and security while safeguarding fairness. This includes considering the implications of data collection methods,... |
10.06.2024 | Применение SFIA Framework для ИБ | При всем уважении к недавно рассмотренной NIST NICE, в ней не хватает одного важного элемента — шкалы квалификации. NIST про нее не забыл, но в настоящее время уровни квалификации к компонентам TKS не привязаны. Документ с несколькими вариа... |
01.06.2024 | Сравнение ITIL v3 и COBIT 5 с помощью методологии PDCA | В настоящей статье рассматриваются вопросы управления жизненным циклом ИТ-предприятия c помощью методологии PDCA на примере отраслевых практик организации ИТ-процессов: ITIL v3 и COBIT 5. Публикация носит теоретически-просветительский харак... |
30.04.2024 | IT Partners, Inc. Appraised at CMMI Level 3 for Services and Development | IT Partners, Inc. - CMMI Appraisal Announcement
Designation reinforces firm's commitment to continued improvement and consistent quality of internal processes.
HERNDON, Va., April 30, 2024 /PRNewswire-PRWeb/ -- IT Partners, a leading provid... |
30.04.2024 | OneTrust announces Keynote Speaker Lineup, Sessions for TrustWeek 2024 | OneTrust, the market-defining leader for trust intelligence, today announced the keynote and speaker lineup for its annual customer and partner event, TrustWeek, taking place May 20-22, 2024, in Austin, Texas. This year’s event will host le... |
18.04.2024 | eTRANSERVICES Appraised at CMMI Maturity Level 3 for Software Development and Maintenance and Service Delivery | eTRANSERVICES reappraised at CMMI ML 3 (DEV) and CMMI ML 3 (SVC), showcasing commitment to excellence in development and service delivery. STAFFORD, VIRGINIA, UNITED STATES, April 18, 2024 /EINPresswire.com/ -- eTRANSERVICES, a leading prov... |
23.03.2024 | Ali Haider: The AI Odyssey of Cybersecurity | Share
Tweet
Share
Share
Email
By Anastasios Arampatzis
Ali Haider is an industry-recognized cybersecurity judge, mentor, and international award winner. He has traversed various regions, including the Middle East, Europe, and the United Sta... |
19.03.2024 | IT Industry Consolidation in Australia an Opportunity for Skills Development | “Transact to transform” will be a key theme across Australia for the next year, according to PwC. CEOs consider technological change to be the single most significant source of change, and 59% of CEOs are planning to execute a deal within t... |
12.03.2024 | Cisco signs agreement with Karnataka govt to train 40,000 in cybersecurity | Networking major Cisco has signed an agreement with the Karnataka government to train 40,000 people in cybersecurity skills and awareness.
Women will represent half of the trained workforce to help meet the growing need for such skills as o... |
01.03.2024 | Invoke Achieves All Security-Related Microsoft Partner Specializations | Invoke - Expert Microsoft Technology Services
Microsoft Solutions Partner, Security - Invoke
Invoke, an award-winning Microsoft partner, has earned all four (4) Microsoft partner specializations for the Security Solution Partner designation... |
20.02.2024 | ISACA Launches New UK Cyber Apprenticeship With BIT Training | The ISACA Certification Body, a specialist in cybersecurity certifications, and BIT Training, a provider of IT and cybersecurity apprenticeships, today unveiled a partnership to help bridge the cybersecurity skills gap in the UK.
“The UK is... |
30.01.2024 | Cybersecurity's Unsung Hero Breaks New Ground in Digital Protection | Carl Williams, Tech Times 30 January 2024, 08:01 pm
Vinay Dutt Jangampet (Photo credit: Vinay Dutt Jangampet)
"Cybersecurity threats evolve faster than ever, and staying ahead is not just about technology but about redefining its appro... |
26.01.2024 | You can not protect what you don't understand: A video interview with Chris Dimitriadis | Cybersecurity might not be a topic you talk, or even think about, daily. When it’s doing its job, you never notice that it’s even there, something that ISACA’s 170,000 members and countless other IT professionals take pride in.
However, whe... |
24.01.2024 | 15 самых востребованных ИТ-сертификаций в 2024 году | Сертификация уже давно стала отличным средством для продвижения по карьерной лестнице в сфере ИТ. Правильно выбранные сертификации могут повысить зарплату, выделить вас среди конкурентов и помочь добиться повышения в текущей должности. По д... |
19.12.2023 | Dynamic technology environments calls for increased upskilling and training, according to cybersecurity experts | A volatile technology environment, highlighted by the rapid ascent of generative AI, creates a heightened urgency for organisations to train and upskill their digital trust professionals, according to several ISACA experts.
ISACA, a global ... |
24.11.2023 | “Trust will make or break an organisation” - Chris Dimitriadis (Chief Global Strategy Officer, ISACA) | We recently caught up with Chris Dimitriadis, an international authority on cybersecurity and digital trust, at the recent ISACA Digital Trust World conference.
Dimitriadis is the Chief Global Strategy Officer of ISACA, an international pro... |
03.11.2023 | ISACA warns enterprises to be aware of AI use in applications | The words on everyone’s lips at the recent ISACA Digital Trust World conference were Artificial Intelligence (AI). Digital risk enthusiasts from around the globe gathered in Dublin to discuss how to get on the front foot of AI and prevent b... |
25.10.2023 | Exploitation of GenAI a Stark Concern for IT Experts | For its latest research, the global digital trust association surveyed professionals who work in audit, risk, security, data privacy and IT governance to get their take on the current state of GenAI.
Compounding IT experts’ concern is the f... |
25.10.2023 | Fundamentals of Data Access Management | Across all industries, and in businesses of all sizes, one thing holds true: The more you know about your customers, the greater your organization’s chances for success. This makes data your company’s most valuable non-human asset. As the r... |
18.09.2023 | Cybersecurity's Unsung Hero Breaks New Ground in Digital Protection | Carl Williams, Tech Times 18 September 2023, 08:09 pm
Vinay Dutt Jangampet (Photo credit: Vinay Dutt Jangampet)
"Cybersecurity threats evolve faster than ever, and staying ahead is not just about technology but about redefining its app... |
15.09.2023 | ISACA Prepares Enterprises for Managing Generative Artificial Intelligence Risk with New Guidance | As excitement around the benefits of generative artificial intelligence applications like OpenAI’s ChatGPT and Google’s Bard has grown, so have the notes of caution from many in the industry, who point to a range of potential risks that cou... |
13.09.2023 | Strong focus on emerging technologies and digital trust at ISACA’s Digital Trust World Europe conference in Dublin | Digital trust and how it relates to emerging technologies, such as the risks around AI, will be the hot topic at ISACA’s Digital Trust World Europe conference in Dublin between 17–19 October 2023. The conference will welcome participants fr... |
11.07.2023 | How Regulatory Requirements Impact Software Development in 2023 | The world of tech regulation is ever-changing as new technologies, guidelines, and reporting requirements arise. If you’re developing software in such a rapidly evolving landscape, you’ll have an increasing number of challenges to overcome.... |
22.06.2023 | Building digital trust to support digital transformation and a distributed workforce | In the UK, we have recently witnessed several issues around trust. These issues center around the ethics and control of data access and use, interaction through the Internet, digital risk resilience and how digital technology has eroded tru... |
14.06.2023 | BLS International Services Limited, Development and Services Division Appraised at CMMI Level 5 | New Delhi, Delhi, India
BLS International Services Limited, Development and Services Division today announced that it has been appraised at level 5 of ISACA’s Capability Maturity Model Integration (CMMI®). The appraisal was conducted by Dr.... |
01.06.2023 | ISACA Pledges to Boost Cybersecurity Skills In Europe | Currently, the cybersecurity landscape in Europe faces significant challenges, even outwith the increasing cyber threats amid a war on European soil.
According to ISACA’s State of Cybersecurity research, 62% of cybersecurity teams are under... |
15.05.2023 | Artificial Intelligence And Cybersecurity: For Good Or Evil? | Timothy Liu is the CTO and cofounder of Hillstone Networks. |
09.05.2023 | Report: Digital Trust Needed but Companies Are Holding Back | ISACA‘s study shows that of the 8,100 respondents, 94% believe that digital trust is relevant to their organisation, with a further 83% of businesses thinking it will be more important over the next five years.
In contrast to this, only 44%... |
26.04.2023 | Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats | In the System Monitoring Room Two Senior Operators Work on a Big Interactive Map. Facility is Full ... [+] of Screens Showing Technical Data.getty |
06.04.2023 | Dispelling The Myths Around Cybersecurity For Small Businesses | Founder & CEO, Corix Partners | Author of "The Cybersecurity Leadership Handbook for the CISO and the CEO" | Cybersecurity Thought Leader |
03.04.2023 | If businesses are to get a grip on their cybersecurity, they need to close the gender gap | Cybersecurity threats are growing at an alarming rate across the globe while at the same time, cybercriminals are becoming even more sophisticated in their methods of attacks. Meanwhile, the shortage of cybersecurity talent is making it dif... |
21.03.2023 | Bringing The Cloud To Underserved Markets | Greg Pavlik, Senior Vice President and Chief Technology Officer, Oracle Cloud Platform. |
17.03.2023 | New Digital Trust–Workforce Inclusion Program to Upskill More than 150 Learners to Prepare for Tech Jobs | ISACA, One In Tech Foundation and the Caterpillar Foundation are partnering to provide instruction, mentorship and career development opportunities
To ready the next generation of learners for digital trust careers, ISACA and its One In Tec... |
05.03.2023 | Введение в IT Governance для технических менеджеров и тимлидов | Всем привет! Меня зовут Владимир Семенюк, я работаю в ИТ уже более 14 лет, 10+ из них руководил командами разработки в качестве тимлида, технического руководителя и CIO. Начинал я как веб‑разработчик, а сейчас в роли CTO занимаюсь стратегич... |
01.03.2023 | Think ChatGPT Should Be Banned From Schools? Here’s Why It Would Be Wrong | Depending on who you ask, the integration of artificial intelligence (AI) into the classroom stirs either fear or excitement.
Fear because AI applications such as OpenAI’s text-generating chatbot are lately breaking the internet. ChatGPT re... |
28.02.2023 | How Do We Close The Skills Gap In The Cybersecurity Industry? | Dan Vigdor is the co-founder of ThriveDX, the global leader in providing cybersecurity training to upskill and reskill learners. |
07.02.2023 | Three Common Ways Cybersecurity Teams Waste Money—And What To Do Instead | CEO and Co-Founder of Cyber Leadership Institute, a fast-growing community of cyberleaders from more than 50 countries. |
03.02.2023 | Healthcare data migration: Best practices and standards | Image: Blue Planet Studio/Adobe Stock
Data is the world’s most valuable resource, and healthcare produces some of the most valuable data. The medical sector generates and stores massive amounts of highly sensitive information, meaning it mu... |
01.02.2023 | Citizant Completes Triennial Appraisal at CMMI Maturity Level 3 for DEV and SVC | Citizant: Federal Enterprise Data & IT Modernization Solutions
Citizant Announces Successful CMMI ML3 Reappraisal
CMMI standards underpin Citizant’s Delivery System, which consistently earns ‘exceptional’ CPARS ratings
The degree of con... |
25.01.2023 | Nominate Rajendra Khare for ISACA Board of Directors | Nominate for Change - Nominate Rajendra Khare for ISACA Board
It is very surprising that, year on year, same individuals get nominated to ISACA Board of Directors. Time that new people with new ideas come on centre-stage.
Nominate someone o... |
23.12.2022 | Softude by Systematix Infotech Appraised at CMMI Level 5 – the highest form of third-party validation. | Softude by Systematix Infotech is now appraised at level 5 of ISACA’s Capability Maturity Model Integration (CMMI®). HOUSTON, TEXAS, USA, December 23, 2022 /EINPresswire.com/ -- Softude by Systematix Infotech today announced that it has bee... |
08.12.2022 | Forrester analysts share 5 shocking cybersecurity predictions for 2023 | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
The cybersecurity and risk privacy landscape is changing... |
17.11.2022 | Digital trust is a key to startup differentiation: Q&A with ISACA's Chris Dimitriadis | Chris Dimitriadis is one of those people who you just know has a lot of information at his fingertips. After 20 years of working with ISACA, the world's leading association for security professionals, he has been part of the movement bringi... |
16.11.2022 | 45% of Indian cos report cybercrime as 2nd biggest fraud after customer frauds: PwC report | Sohini Bagchi 16 Nov, 2022
More than half (52%) of Indian companies experienced fraud or economic crime in the last 24 months, with 45% of Indian organisations reporting cybercrime as the second biggest fraud after customer frauds (47%) inv... |
09.11.2022 | SANS, Google Cloud and Palo Alto Networks Collaborate with Cyversity to Launch Global Cyber Diversity Academy | “This program will bring new cybersecurity professionals into the workforce with the practical skills and knowledge needed to make our world a safer place,” said Max Shuftan, Director, Mission Programs & Partnerships, SANS.
NEW YORK (PR... |
03.11.2022 | Skills Shortage Threatens Cloud Security | CEO and cofounder of Ermetic, a provider of public cloud security technology for AWS, Azure and Google Cloud infrastructures. |
02.11.2022 | Why Security Pros Will Face Greater Internal Risks Next Year | In 2023, as organizations chart their growth path forward, they must contend with cybersecurity, risk, and privacy challenges from external forces, like evolving attacker tactics and market dynamics, as well as internal forces, like enablin... |
02.11.2022 | Digital trust – a new benchmark we didn't know we needed | “If you want to drive a Ferrari really fast, the most important part is the brakes,” recounts David Samuelson, CEO of ISACA. He says that when thinking about innovation, often the thing that's keeping businesses from moving quickly is a lac... |
25.10.2022 | New ISACA Publications Highlight Machine Learning Technology and Compliance Risk for Auditors | The increased use of machine learning (ML) worldwide has created a greater need for IT auditors to understand the technology. ISACA’s new white paper series, Audit Practitioner’s Guide to Machine Learning, Part 1: Technology and Audit Pract... |
18.10.2022 | Vinomofo has admitted to a major data breach – but your drinking habits are safe | Source: Supplied
Vinomofo has admitted to a data breach where the personal information of customers has been stolen.
The online wine retailer sent customers an email about the breach on Monday evening. It revealed that some of the details t... |
13.10.2022 | Tackling digital trust and levelling up data security – ISACA Europe | Do you feel confident that your data is secure?
Me neither. And the statistics are here to back it up – nearly 1 in 8 people in the world have had their personal data leaked onto the dark web.
The sentiment is widespread – according to a st... |
11.10.2022 | Businesses are at risk of losing consumers post a cyber-attack: ISACA | Sohini Bagchi 11 Oct, 2022
Four in 10 consumers in India have had their personal information stolen by cyber criminals in the last one year, according to a new research and notably, companies in India that experienced a breach in security o... |
30.09.2022 | 15 highest-paying certifications for 2022 | Image: iStockphoto.com/SamuelBrownNG
IT professionals looking to become certified in a particular technology, and earn a healthy salary to boot, should focus on the cloud or cybersecurity, at least according to the latest information from e... |
28.09.2022 | Intel’s confidential computing solution for protecting cloud data is tested in healthcare | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Ensuring the integrity of software isn’t easy. At one level or another, you have to place trust that a third party impl... |
15.09.2022 | 57% of organisations do not offer training in 'digital trust': Study | Sohini Bagchi 15 Sep, 2022
Successful digital transformation requires an organisantion’s stakeholders, including employees, partners and customers to have a strong faith in the technology the company invests in and also the outcome. A recen... |
15.09.2022 | Report: Digital trust is critical, but many enterprises are not prioritizing it | As enterprises worldwide compete in the race for digital transformation, a new study finds significant gaps between what they are doing now and what they should do to establish leadership and earn customer trust in the future digital ecosys... |
15.09.2022 | Cybersecurity firm Fortanix secures capital to provide confidential computing services | Companies (and VCs) spend billions of dollars on cybersecurity, but primarily focus on protecting infrastructure or endpoints. That’s not always the right approach in a world where — thanks to the pandemic — data is increasingly distributed... |
19.08.2022 | 10 top cybersecurity online courses and certifications in 2022 | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Table of contents
What is a cybersecurity online course/certification?
Key must-have course programs and trainings for ... |
26.07.2022 | How to be an effective CIO | Businesses turn to their CIOs with the expectation that they are experts in any given field of technology. Beyond this, they will expect their CIO to implement solutions that meet business requirements at a low cost and with prescient fores... |
15.07.2022 | IT-специалисты в сфере информационной безопасности: как получить профессию и сколько можно заработать? | 25 февраля 2022 года международная сеть хактивистов Anonymous объявила правительству РФ кибервойну. С тех пор под атаку группировки успели попасть ряд крупнейших отечественных СМИ, Банк России, сайты Кремля и Минобороны.
В то же время на фо... |
27.06.2022 | The Strategic Relevance of Cybersecurity Skills | Evidence suggests there is a global cybersecurity skills shortage affecting businesses and governments alike, which means that organizations are struggling to fill their cybersecurity vacancies. For example, the United Kingdom would need to... |
24.06.2022 | Best cybersecurity certifications in 2022 | Image: Ico Maker/Adobe Stock
Cyber attacks are continuing to increase. We can blame it on how fast tech advances or the inability of businesses to keep up (or both). Regardless, the threat is serious.
According to Accenture’s recent State o... |