<?xml version="1.0" encoding="utf-8"?>
<rss version="0.92">
<channel>
<title>SecuObs.com</title>
<link>http://www.secuobs.com</link>
<description>Observatoire de la securite Internet</description>
<language>fr</language>
<webMaster>webmaster@secuobs.com</webMaster>
 <item><title>Digital Badges for  ISC  Credentials   Broadcast Your Accomplishments</title><description>2016-04-25 22:49:44 -  ISC 2 Blog : Security professionals know that their skills are in demand Employers looking to fill security roles are looking for candidates to differentiate themselves and stand out Increasingly certification plays a critical role in that process and helps signal to employers that candidates have the knowledge and experience to fill key roles I am happy to introduce a new feature for  ISC  certified members to help broadcast their certification achievements  ISC  has partnered with an organization called Acclaim, a subsidiary of Pearson VUE, to enable verifiable digital representations of our certifications When members accept the digital badge from Acclaim they can broadcast </description><link>http://www.secuobs.com/revue/news/604658.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/604658.shtml</guid></item>
<item><title> ISC ² to Host International Standards Organization Meeting </title><description>Secuobs.com : 2016-04-07 18:18:02 -  ISC 2 Blog - Many of you will know that  ISC ² is hosting a major event this month   in downtown Tampa, Florida   and I m sure that you ve also heard the phrases ISO and SC27 But what does this all mean  ISO is the International Standards Organisation, set up in 1947, which oversees the creation, publication and maintenance of standards covering everything from acid-free paper to quality management systems, smart cities to information, and cybersecurity ISO has committees of experts   drawn from around the world   who volunteer their time and share their knowledge to create and maintain standards Each committee has </description><link>http://www.secuobs.com/revue/news/603140.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/603140.shtml</guid></item>
<item><title>Crafting My Name on the  Hall of Fame </title><description>Secuobs.com : 2016-04-05 22:34:59 -  ISC 2 Blog - There was an old practice at my previous workplace that they asked the employees to post their recently attained industry certifications on a board in a common area where everyone can share one s happiness of getting a new certification Gradually, the board becomes the  Hall of Fame  in the office That was the first time I saw the actual CISSP certificate During my university days, my major subject was in Voice over IP Since VoIP is an application running on the Internet, it also inherits a lot of Internet security issues Ever since then, I was fascinated by the world </description><link>http://www.secuobs.com/revue/news/602933.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/602933.shtml</guid></item>
<item><title>Digital Badges for  ISC ² Credentials   Broadcast Your Accomplishments</title><description>Secuobs.com : 2016-04-01 16:13:14 -  ISC 2 Blog - Security professionals know that their skills are in demand Employers looking to fill security roles are looking for candidates to differentiate themselves and stand out Increasingly certification plays a critical role in that process and helps signal to employers that candidates have the knowledge and experience to fill key roles I am happy to introduce a new feature for  ISC ² certified members to help broadcast their certification achievements  ISC ² has partnered with an organization called Acclaim, a subsidiary of Pearson VUE, to enable verifiable digital representations of our certifications When members accept the digital badge from Acclaim they can broadcast </description><link>http://www.secuobs.com/revue/news/602672.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/602672.shtml</guid></item>
<item><title>Insecure of Things</title><description>Secuobs.com : 2016-03-25 04:49:32 -  ISC 2 Blog - During this exciting time of technological advancements, when there is an app for every facet of our lives, from letting you know the right time to take a bathroom break during a movie to how to build a space shuttle, why am I continually disappointed  We have become a generation addicted to our apps and having the latest and greatest technologies, but that comes with a steep price We have to continually ask ourselves with every purchase and click, what is my data and privacy worth if and when it is leaked, breached or stolen  George Santayana wrote   Those who </description><link>http://www.secuobs.com/revue/news/602028.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/602028.shtml</guid></item>
<item><title> ISC ² Member Devon Bryan Earns Fed 100 Award for Working to Change the Face of Security </title><description>Secuobs.com : 2016-03-23 14:52:15 -  ISC 2 Blog - Devon Bryan, an  ISC 2 member for nearly 20 years, is receiving a distinguished Federal Computer Week Federal 100 Award this year The award recognizes 100 US government and industry leaders who have played pivotal roles in the federal government IT community individuals who have gone above and beyond their daily responsibilities and have made a difference in the way technology has transformed their agency or accelerated their agency's mission Devon and the other winners will be honored at a gala ceremony on April 7 Devon served in the United States Air Force as a Lead Network Engineer for 11 years After </description><link>http://www.secuobs.com/revue/news/601846.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/601846.shtml</guid></item>
<item><title>Cloud Security - Where to Begin  </title><description>Secuobs.com : 2016-03-14 17:48:31 -  ISC 2 Blog -  Translated from Spanish  The use of tools in the cloud and hybrid cloud have reduced business costs and stimulated unprecedented growth in adoption rates worldwide Several studies show that the cloud is here to stay  which makes it important to analyze the most efficient ways to control and reduce risks, such as threats of invasion, attacks, leakage of sensitive information and unavailability of services Cloud security is one of the main concerns of IT managers In addition, the Cloud Security Alliance  CSA  reveals that only 16 percent of organizations have fully implemented policies and controls around using the cloud The </description><link>http://www.secuobs.com/revue/news/601016.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/601016.shtml</guid></item>
<item><title>Seguridad en la nube -  Por dónde empezar  </title><description>Secuobs.com : 2016-03-11 22:16:57 -  ISC 2 Blog - La utilización de herramientas en la nube y en la nube híbrida ha reducido los costos de las empresas de forma inédita y estimulado su crecimiento en todo el mundo Diversos estudios revelan que la nube ha llegado para quedarse, lo que torna importante el análisis de las medidas más eficientes para controlar y reducir riesgos, tales como amenazas de invasión, ataques, fuga de información sensible e indisponibilidad de servicios La seguridad en la nube es el principal motivo de preocupación de los gestores de TI en el mundo Las estimaciones indican que más del 70pourcents de ellos no confía </description><link>http://www.secuobs.com/revue/news/600863.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/600863.shtml</guid></item>
<item><title>Segurança na Nuvem - Por onde começar </title><description>Secuobs.com : 2016-03-11 22:16:57 -  ISC 2 Blog - A utilização de ferramentas na Nuvem e Nuvem Híbrida tem reduzido os custos das empresas de forma inédita, e estimulado o seu crescimento em todo o mundo Diversas pesquisas revelam que a Nuvem chegou para ficar, o que torna importante a análise das medidas mais eficientes para controlar e mitigar riscos, como ameaças de invasão, ataques, vazamento de informações sensíveis e indisponibilidades de serviços A segurança na Nuvem é o principal motivo de preocupação dos gestores de TI no mundo Estimativas indicam que mais de 70pourcents deles não confiam nas técnicas tradicionais de proteção dos dados Além disso, a Cloud </description><link>http://www.secuobs.com/revue/news/600862.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/600862.shtml</guid></item>
<item><title>The Accidental Security Threat  Insiders</title><description>Secuobs.com : 2016-03-09 18:02:14 -  ISC 2 Blog - Insider threats can be malicious  but more commonly, they are accidental The weakest point in any security program is people They can have ill intent, they can also be manipulated or exploited, and they can simply make a mistake and email a spreadsheet full of client information to the wrong email address These types of incidents are real and happen every day They can lead to disastrous results on par with any major external cyberattack Traditionally, these threats are overlooked by most businesses as they are more concerned with the unknown malicious actor than the known staff member or business </description><link>http://www.secuobs.com/revue/news/600607.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/600607.shtml</guid></item>
<item><title>Dispelling Myths - The Role of the  ISC ² Board of Directors</title><description>Secuobs.com : 2016-03-03 19:06:47 -  ISC 2 Blog - As chair of the  ISC ² Bylaws committee, I want to provide clarification about the role of the  ISC ² Board of Directors There seems to be ongoing confusion by some members about the role of the board, and I d like to clear up the confusion There are two documents that govern the responsibilities and activities of the organization  the Articles of Association and the Bylaws The Bylaws clearly state  The Board of Directors shall have the powers and duties of a board of directors pursuant to the laws of the Commonwealth of Massachusetts, and shall be responsible for the policy and </description><link>http://www.secuobs.com/revue/news/600081.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/600081.shtml</guid></item>
<item><title>The Need for Encryption Legislation</title><description>Secuobs.com : 2016-03-01 22:00:04 -  ISC 2 Blog - The current stand-off between Apple and the FBI highlights a growing problem  How do we balance privacy rights with the current patchwork of legislation that has failed to keep pace with the technological advances changing business and society  For anyone following current events, the ongoing debate displays the need for comprehensive legislation Will Apple continue to defy the court order and, in essence, prevent the government from gaining information from a corporate owned device used by a dead terrorist  Is the government prepared to set a precedent and force Apple and other companies to knowingly provide code to make it </description><link>http://www.secuobs.com/revue/news/599832.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/599832.shtml</guid></item>
<item><title>Celebrating my 10 years of Safe and Secure Online Service</title><description>Secuobs.com : 2016-02-23 15:53:19 -  ISC 2 Blog - The 9th February 2016 was International Safer Internet Day when organisations across the world joined together to promote the safe and responsible use of digital technology for children The day also marked my 10 years of teaching the  ISC ² Foundation s Safe and Secure Online lessons at schools across the United Kingdom To celebrate, I visited Robert Bloomfield Academy in the midlands area to speak to over 900, 9-13-year-old students about Internet safety Robert Bloomfield Academy has consistently been rated  Outstanding  by Ofsted  UK regulators  and specialises in Science Technology Engineering and Math  STEM  subjects, boasting a lot of hi-tech equipment </description><link>http://www.secuobs.com/revue/news/599133.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/599133.shtml</guid></item>
<item><title>Getting a Foot in the Door of the Security Industry</title><description>Secuobs.com : 2016-02-15 22:07:01 -  ISC 2 Blog - Computers have always interested me because of their determinism They would perform perfectly if they were coded and built perfectly  it is the imperfect coding and building of computers that leave them open to attack   and further, why we must take on defensive roles to protect them I saw information security as a developing field where I could fill a void, become an expert and help shape the industry It also seemed cool to know how things could be broken and to prevent that from happening That s why I decided to study computer science at the National University of </description><link>http://www.secuobs.com/revue/news/598365.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/598365.shtml</guid></item>
<item><title>New Federal CISO  History in the Making </title><description>Secuobs.com : 2016-02-10 15:37:13 -  ISC 2 Blog - Yesterday marked a significant day in US government cybersecurity history   and certainly for those of us in the profession   the day that the White House announced its plan to hire a Chief Information Security Officer  CISO  For decades, we at  ISC 2 have advocated for the voice of CISOs to be heard, for CISOs to be granted a seat at the executive table And yesterday, the Executive Office of the United States has put out the invitation for one of us to take part in executive decisions   a validation of sorts for cybersecurity professionals who have spent their </description><link>http://www.secuobs.com/revue/news/597883.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/597883.shtml</guid></item>
<item><title>Top 10  ISC ² Secure Webinars of 2015</title><description>Secuobs.com : 2016-01-20 17:11:20 -  ISC 2 Blog - As 2016 begins, many people start setting professional development goals for the year With travel budgets often limiting the ability for professionals to attend in-person training and events, online webinars offer a convenient, cost effective way to learn Whether you re looking for ways to expand your knowledge by earning continuing professional education credits or you re searching for information on topic areas you re unfamiliar with,  ISC ² Secure Webinars feature security experts from around the globe discussing today s best practices and challenges in cyber, information, software and infrastructure security In 2015, we offered a total of 42 webinars   that s nearly one </description><link>http://www.secuobs.com/revue/news/596057.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/596057.shtml</guid></item>
<item><title>The Next Person Up</title><description>Secuobs.com : 2016-01-05 15:15:09 -  ISC 2 Blog - In US football, the terms  next man up  and  do your job  are often used as call to action mantras to spur a unified approach to consistency and sustained performance The  ISC ² 2015 Global Information Security Workforce Study  GISWS  cites that out of the nearly 14,000 respondents, only six percent are under the age of 30 Coupled with the projected 15 million qualified  next person up  deficit between now and 2020, we have a global challenge to address the currently stretched thin workforce by ensuring future capabilities within the profession As the current aging workforce begins to retire, we also </description><link>http://www.secuobs.com/revue/news/594848.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/594848.shtml</guid></item>
<item><title>Leading into 2016</title><description>Secuobs.com : 2015-12-31 17:18:06 -  ISC 2 Blog - My brother is a retired Army Colonel who recently received a Canadian Meritorious Service Medal for his support of Canadian troops in Afghanistan This was naturally a source of pride for my family When I read the medal citation, a sentence jumped out at me   Col Shearer s superb leadership was vital to operational success and helped preserve Canada s legacy in Afghanistan  I read a lot, and I tend to parse out words that resonate with me like   leadership, vital, operational success, preserve and legacy  As we assess ourselves as cyber, information, software and infrastructure security professionals, we might ask if </description><link>http://www.secuobs.com/revue/news/594605.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/594605.shtml</guid></item>
<item><title>What I Want for the Holidays </title><description>Secuobs.com : 2015-12-09 17:45:45 -  ISC 2 Blog - Lately, we ve seen news stories about cyberattacks on manufacturers of children s electronics, during which millions of parents  and children s personal information, including photos of children, were stolen One incident involved over six million children s profiles worldwide, including almost three million from the US As an information security professional, we understand that in cyberspace, there will be casualties But, we have to do our best to minimize the casualties and most important of all, that they do not involve children After the latest breach incident at V Tech, we saw experts sharing their technical advice on what we can do as </description><link>http://www.secuobs.com/revue/news/592632.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/592632.shtml</guid></item>
<item><title>Colleges Shouldn t Become Training Facilities, Warns Dr Jane LeClair</title><description>Secuobs.com : 2015-11-11 21:34:41 -  ISC 2 Blog - Academic institutions are under a lot of pressure to churn out as many cybersecurity graduates as possible who have skills they need to get to work right away and get us out of the skills crisis we re in According to Dr Jane LeClair, COO for  ISC 2 Global Academic Program  GAP  member National Cybersecurity Institute at Excelsior College, however, transforming universities into training facilities is a dangerous move that fails to cultivate the creativity and critical thinking skills people need to be successful in the field Instead, she believes that combining education and certification is key to cultivating the future cybersecurity </description><link>http://www.secuobs.com/revue/news/589813.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589813.shtml</guid></item>
<item><title>Insecure Mobile Apps  An Urgent Call for Best Practices in App Development</title><description>Secuobs.com : 2015-11-04 17:15:54 -  ISC 2 Blog - Application security continues to be a growing concern according to respondents of the latest  ISC 2 2015 Global Information Security Workforce Study Consistent with the past two  ISC ² studies in 2011 and 2013, application vulnerabilities and malware are at the top of the list These concerns are trending upward as 72 percent of survey respondents in the 2015 study selected this vulnerability and threat as either a top or high concern As mobile platforms increasingly become the choice for delivering services, applications on the mobile devices are also a top concern for information security professionals As more sensitive data and transaction </description><link>http://www.secuobs.com/revue/news/589064.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589064.shtml</guid></item>
<item><title> ISC ² Associate Program  The Entry Pathway to a Cybersecurity Career </title><description>Secuobs.com : 2015-10-29 21:02:26 -  ISC 2 Blog - As noted in our latest Global Information Security Workforce Study, the majority of security professionals  78 percent  anticipate the greatest need for new hires at the entry-level in their organizations With a predicted shortage of 15 million global cybersecurity professionals by 2020, we must put efforts behind bringing more entrants into the industry It s one of my goals to bring more awareness to the Associate of  ISC ² program, which is ideal for students, recent graduates just beginning their career journey, or those new to cyber, information, software and infrastructure security Many college graduates today have a difficult time finding employment </description><link>http://www.secuobs.com/revue/news/588463.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/588463.shtml</guid></item>
<item><title> ISC ² GAP Instructor Mantra    Never Stop Learning  </title><description>Secuobs.com : 2015-10-20 21:02:29 -  ISC 2 Blog - Meet Donnie Grimes,  ISC ² Global Academic Program  GAP  instructor and vice president of information systems and creator of the master s program in cybersecurity for the University of the Cumberlands Oh, and budding sound man When he s not teaching, Donnie works on sound engineering and mixing at live events He s also starting to learn about staging and lighting As a teacher, his favorite classroom moments are those times when he s able to witness students  reactions as they realize they start to grasp a difficult concept He reflects,  Seeing their faces light up and being a small part of contributing to a </description><link>http://www.secuobs.com/revue/news/587418.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/587418.shtml</guid></item>
<item><title>Securing Tomorrow  Society Must Wake Up and Take Ownership of Identity</title><description>Secuobs.com : 2015-10-16 20:23:45 -  ISC 2 Blog - There are trends that have been on the industry s radar for a while now  social, mobile, applications and cloud However, within the next year, we ll see more of an emphasis on one of the key underpinnings of these trends   identity The issues with data management and security are often told and understood from an industry, business or sector perspective  but society as a whole is still arguably not at a point where it is fully awake to these issues and how they directly affect individuals Next year, I believe we will begin to see people recognising the need to </description><link>http://www.secuobs.com/revue/news/587028.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/587028.shtml</guid></item>
<item><title>National Cybersecurity Awareness Month  YOU Have the Power to Change Cybersecurity</title><description>Secuobs.com : 2015-10-14 00:04:15 -  ISC 2 Blog - National Cybersecurity Awareness Month in October is the perfect time to reflect on what you re doing to overcome the cybersecurity skills shortage That s right   you   personally According to Dr Jane LeClair, COO for the National Cybersecurity Institute at Excelsior College, the cybersecurity skills shortage is everyone s problem, and we all have a responsibility to meet this need Dr LeClair believes that in order to shore up the workforce, it s essential to broaden the pool of candidates beyond typical populations  such as the military and IT  Dr LeClair sees cybersecurity awareness   both its impact on our daily lives </description><link>http://www.secuobs.com/revue/news/586624.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/586624.shtml</guid></item>
<item><title> ISC ² Clarifies Board Petition Process</title><description>Secuobs.com : 2015-10-08 17:11:25 -  ISC 2 Blog - To  ISC ² Members  A few of you have contacted  ISC ² with questions pertaining to the  ISC ² board of directors  election, specifically the petition process In an effort to provide transparency, we feel it is important to review how the petition process works Every member included on the slate goes through one of two processes First, slate candidates may be selected by the board nominations committee Second, the petition process whereby  ISC ² members can nominate themselves or others through petitioning and providing 500 signatures of members in good standing When members submit a petition,  ISC ² performs a thorough, detailed analysis to </description><link>http://www.secuobs.com/revue/news/586108.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/586108.shtml</guid></item>
<item><title>Encryption is not solving all cybersecurity problems</title><description>Secuobs.com : 2015-10-02 16:21:12 -  ISC 2 Blog - Encryption is a measure to enhance security because it can protect files and data It is important, but alone, it definitely doesn't make a system secure A system is as secure as its weakest component If the component resides behind the encryption layer  which usually is the one where the data leaves or enters the system , then the Integrity and possibly Availability of the data is compromised, despite the fact that it is transferred encrypted And if this happens, the compromised data is going to be transmitted encrypted, so very secure, but nevertheless compromised </description><link>http://www.secuobs.com/revue/news/585496.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/585496.shtml</guid></item>
<item><title>The University of the Cumberlands Knows No Boundaries</title><description>Secuobs.com : 2015-08-13 17:41:52 -  ISC 2 Blog - For Donnie Grimes,  ISC ² Global Academic Program  GAP  instructor and vice president of information systems and creator of the Master s program in cybersecurity for the University of the Cumberlands, based in Williamsburg, Kentucky, breaches know no boundaries   and neither should cybersecurity education A GAP member since 2014, the University has historically served people from the Appalachia area  and until 2014, had no cybersecurity offering Over the past 10-15 years, however, its sphere of influence has increased, with thriving graduate programs and students representing 58 different countries and most US states With a 40-year stint as a two-year school, Cumberlands </description><link>http://www.secuobs.com/revue/news/580103.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/580103.shtml</guid></item>
<item><title>To  ISC ² Global Academic Program  GAP  Instructor John Sands, the Next Generation is Everything</title><description>Secuobs.com : 2015-08-04 16:43:35 -  ISC 2 Blog - To GAP instructor John Sands, the next generation is everything He has dedicated his career to teaching and creating programs that fill the cybersecurity education gap that persists today His work has propelled the cybersecurity field forward by decades In addition to his role as GAP instructor, Sands is also the department chair for Computer Integrated Technologies at Moraine Valley Community College and co-founder for the National Center for Systems Security and Information Assurance  CSSIA , a GAP member since 2014 Early in his career, he recognized that schools and universities were lacking cybersecurity programs, let alone offering programs that could </description><link>http://www.secuobs.com/revue/news/579313.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/579313.shtml</guid></item>
<item><title>5 Reasons Security Congress is the  ISC ² Member Event of the Year</title><description>Secuobs.com : 2015-07-13 15:30:10 -  ISC 2 Blog - The fifth annual  ISC ² Security Congress, proudly co-located with the 61st annual ASIS International Annual Seminar and Exhibits, is scheduled for September 28 through October 1 in Anaheim, California, USA We expect more than 19,000 information security and operational security professionals to join us, making this one of the largest and most unique conferences you will experience In honor of the fifth annual  ISC ² Security Congress, here are five reasons this year's Security Congress is the  ISC ² member event of the year Largest CPE Opportunity of the Year With so much to see and do at  ISC ² Security Congress, there </description><link>http://www.secuobs.com/revue/news/576879.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/576879.shtml</guid></item>
<item><title>Why Hiring CCSPs will Help the C-Suite Sleep at Night</title><description>Secuobs.com : 2015-07-08 20:20:56 -  ISC 2 Blog - A few short years ago, cloud computing was considered a relatively new concept inherent with risks that many IT professionals weren t comfortable taking I ll avoid the debate about who coined the term cloud computing, but I m old enough to remember how we formerly referenced the cloud in telecommunications as a way to simplify and abstract the details of the external network that s connected to internal devices Today, the concept of cloud computing is intended to simplify communication by eliminating the need to know all of the specifics of the cloud provider s underlying software and infrastructure The cloud provides benefits to </description><link>http://www.secuobs.com/revue/news/576504.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/576504.shtml</guid></item>
<item><title>A Simpler Way to Research Regulatory Requirements</title><description>Secuobs.com : 2015-06-30 18:47:42 -  ISC 2 Blog - Commonplace to information security professionals, regulatory compliance does not necessarily guarantee security However, in a world rife with perpetual breaches and data loss, we hear more and more about the importance of regulatory compliance and IT governance, risk management and compliance  or GRC for short  For those folks who are required to abide by regulations such as HIPAA, SOX or PCI  especially those who fall under multiple regulations , maintaining compliance can be cumbersome These requirements, in addition to normal information security duties, can be simply overwhelming for many of today s professionals This is one of many reasons why I was </description><link>http://www.secuobs.com/revue/news/575885.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/575885.shtml</guid></item>
<item><title>CSSIA - Closing the Gap in Cybersecurity Education for Nearly 30 Years</title><description>Secuobs.com : 2015-06-25 22:19:56 -  ISC 2 Blog - To provide insight into the positive strides the  ISC 2 Global Academic Program  GAP  and its member schools are making in filling the pipeline for qualified professionals, we re going to highlight a different GAP school every other month The National Center for Systems Security and Information Assurance  CSSIA , one of the country s first comprehensive Centers for Advanced Technology Education, became a GAP member school in 2014 CSSIA has four goals focused on innovation in cybersecurity education  Expanding and enhancing cyber security curriculum labs, skills events and competitions Building a national infrastructure of qualified cybersecurity educators Developing national infrastructure remote virtualization lab </description><link>http://www.secuobs.com/revue/news/575497.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/575497.shtml</guid></item>
<item><title>5 Apps Children are Using That Parents Should Be Aware of  During the School Break</title><description>Secuobs.com : 2015-06-17 21:20:24 -  ISC 2 Blog - Facebook, Twitter, Tumblr, Down, Instagram, Snapchat It seems like every day there s a new app available for children to connect with friends and strangers online According to McAfee s Digital Deception Study 2013, only 20 percent of parents say they know how to find out what their child is doing online And nearly 70 percent of the study s respondents  ages 10-23  take some measure to hide their online behavior from their parents With so many new apps and social platforms springing up, it can be difficult for parents to monitor their children s online activities It can be especially difficult when children </description><link>http://www.secuobs.com/revue/news/574431.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/574431.shtml</guid></item>
<item><title>CISSP  A Global Force at 100,000 Strong</title><description>Secuobs.com : 2015-05-29 18:23:24 -  ISC 2 Blog - Whenever we look toward the future, we have to first look back and think about where we came from Back in 1989,  ISC ² was established by a handful of passionate volunteers who wanted to create a set of standards for a newer concept, not yet a full-fledged career field, called information security In the minds of these volunteers, having the initial 500 applicants sign up to take the Certified Information Systems Security Professional  CISSP  was considered quite a success Little did they imagine that 26 years later, not only would those 500 applicants grow to a cadre of 100,000 CISSP </description><link>http://www.secuobs.com/revue/news/572412.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/572412.shtml</guid></item>
<item><title>Comments from  ISC ² Leadership on CareFirst Breach </title><description>Secuobs.com : 2015-05-22 19:10:04 -  ISC 2 Blog - If this breach follows the pattern of other health IT breaches as of late, then this type of intrusion at CareFirst wouldn t be considered particularly difficult for an advanced team of malicious actors The main objective would be to steal a set or multiple sets of user credentials A juicy target would be an administrator or super user with high levels of access This could be done using malware from a spear phishing attack or a watering hole attack From there, the bad actors would actually be using legitimate user credentials to steal the data for which they are looking </description><link>http://www.secuobs.com/revue/news/571716.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/571716.shtml</guid></item>
<item><title>On the Front Lines    ISC ² Global Academic Program  GAP  Instructors are Shaping the Workforce of the Future   Introducing Derek A Smith</title><description>Secuobs.com : 2015-05-21 22:23:12 -  ISC 2 Blog -  ISC 2 GAP Instructors bring a wealth of experience, wisdom and inspiration to students worldwide They are the heartbeat of the program and have helped  ISC 2 become the world leader in cybersecurity education They are helping us fulfill our mission to enhance the cybersecurity workforce through education and certification, one student at a time But what makes them tick  What drives them to give so much back to the profession  What do they do when they re not teaching  To give you a glimpse into their world and into the impact they re having on the next generation, we re going to profile a </description><link>http://www.secuobs.com/revue/news/571575.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/571575.shtml</guid></item>
<item><title>US Department of Defense Cyber Strategy  One of Five Strategic Goals to Building and Maintaining the Cyber Workforce </title><description>Secuobs.com : 2015-05-19 22:38:46 -  ISC 2 Blog - The US Department of Defense  DoD  just released its new cybersecurity strategy report for 2015 This strategy sets five strategic goals  1 Build and maintain ready forces and capabilities to conduct cyberspace operations  2 Defend the DoD information network, secure DoD data, and mitigate risks to DoD missions  3 Be prepared to defend the US homeland and US vital interests from disruptive or destructive cyberattacks of significant consequence  4 Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environment at all stages  and 5 Build and maintain robust </description><link>http://www.secuobs.com/revue/news/571272.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/571272.shtml</guid></item>
<item><title> ISC ² Study  Workforce Shortfall Due to Hiring Difficulties Despite Rising Salaries, Increased Budgets and High Job Satisfaction Rate</title><description>Secuobs.com : 2015-04-19 04:04:24 -  ISC 2 Blog - How can there be a workforce shortage in information security if global professionals are reporting rising salaries, increased budgets, high job satisfaction rates and low changes in employment status  The results of the seventh  ISC ² Global Information Security Workforce Study  GISWS  conducted by Frost   Sullivan for the  ISC ² Foundation with the support of Booz Allen Hamilton, Cyber 360 Solutions and NRI Secure Technologies reveal that the security of businesses is being threatened by reports of understaffed teams dealing with the complexity of multiple security technologies and the threats posed by our increasingly connected world The analysts from Frost   </description><link>http://www.secuobs.com/revue/news/567714.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/567714.shtml</guid></item>
<item><title> ISC ² Directors, Executives and Advisory Council Members Speaking at the RSA 2015 Conference</title><description>Secuobs.com : 2015-04-15 23:33:15 -  ISC 2 Blog - Don't miss the speaking sessions at next week's RSA Conference by members of the  ISC ² Board of Directors, Executive and Management Teams,  ISC ² Foundation, the  ISC ² Application Security Advisory Council and North America Advisory Council Follow the discussions around some of these sessions on Twitter  ISC2 and  RSAC and Facebook  isc2fb Also, don't forget to stop by our booth -  108   109 Monday, April 20 Session Title  Status of the Industry  2015 Global Information Security Workforce Study 9 00 am-9 50 am West Room 3022 Status of the Industry  2015 Global Information Security Workforce Study - See more at  https wwwrsaconferencecom events us15 agenda sessions 1803 status-of-the-industry-2015-global-information sthashcs86ZeGKdpuf Status of the </description><link>http://www.secuobs.com/revue/news/567538.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/567538.shtml</guid></item>
<item><title> ISC ² Global Academic Program Fills the Gap  Between Schools and the Cybersecurity Skills Crisis</title><description>Secuobs.com : 2015-04-08 18:40:54 -  ISC 2 Blog - There is a well-documented, widely recognized shortage of information security professionals From our own most recent Global Information Security Workforce Study i , 56pourcents of 12,000 respondents from around the globe believe there is a workforce shortage In November of last year, a special Parliamentary Select Committee in the United Kingdom s House of Lords reported that we re facing a global shortage of  no less than two million cybersecurity professionals 2 by the year 2017 And in 2013, a US Government Accountability Office  GAO  report stated that the vacancy rate of the DHS s National Protection and Programs Directorate s Office of Cybersecurity and Communications was </description><link>http://www.secuobs.com/revue/news/566549.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/566549.shtml</guid></item>
<item><title>IT Security essentials for small and medium enterprises</title><description>Secuobs.com : 2015-03-22 23:00:34 -  ISC 2 Blog - It is no secret that the cyber criminals are where the money are If the targets are easy to breach, it is even better since this improves the ratio effort outcome for them Usually, small to medium size companies are preferred targets because they fit in this category  they do have money, more than the private users, and are very easy to infiltrate The tips below help these companies not only to survive in the cyber world, but also keep the attackers away </description><link>http://www.secuobs.com/revue/news/564430.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/564430.shtml</guid></item>
<item><title>Comments from  ISC ² Leadership on Primera Blue Cross Breach </title><description>Secuobs.com : 2015-03-18 15:22:53 -  ISC 2 Blog - Those of us within the information security industry have known for some time that the healthcare industry was going to be a prime target for these types of attacks Unfortunately, we re likely to continue to see more of these breaches as the healthcare industry scrambles to improve its information security posture I think we re all concerned about the broad implications of these breaches regarding potential fraud, identity theft and the other strategies criminals use to monetize healthcare information -David Shearer, CISSP, PMP, Executive Director,  ISC ² As the hacking assault on medical providers continues, a long-time penetration of Premera Blue Cross  </description><link>http://www.secuobs.com/revue/news/563921.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/563921.shtml</guid></item>
<item><title>New Online Tool Helps  ISC ² Members Manage Vulnerabilities</title><description>Secuobs.com : 2015-03-16 14:53:45 -  ISC 2 Blog -  ISC ² members now have a new tool to help corral vulnerabilities and published threats found throughout the Internet Vulnerability Central is powered by Cytenna's tool, ThreatRank, and is the first module of a larger Security Central portal New modules are scheduled for release throughout the coming years With this new online tool, system administrators and other information security professionals can  -Check in to see the latest vulnerabilities and threat reports in one place -Receive early notification of vulnerabilities to be better prepared to respond -Research and prioritize detailed vulnerabilities, which are categorized based on criticality -Filter vulnerabilities based on the </description><link>http://www.secuobs.com/revue/news/563581.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/563581.shtml</guid></item>
<item><title>Evaluating Cloud Services for Small and Medium Enterprises  The  ISC ² Perspective</title><description>Secuobs.com : 2015-03-12 19:55:50 -  ISC 2 Blog - As a smaller organization, we balance building out more internal and robust IT infrastructure versus utilizing cloud services to fulfill those needs More infrastructure also means more personnel and overhead, and we weigh that against cost to determine the value of cloud services to our organization We then balance whether or not the IT service we are thinking of moving to the cloud is a core or unique service to our business versus merely a commodity Moving commodity services to the cloud, particularly to those providers with highly evolved and transparent security models, are particularly attractive to  ISC ² The freedom </description><link>http://www.secuobs.com/revue/news/563229.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/563229.shtml</guid></item>
<item><title>Cybersecurity Jobs are in High Demand  Got what it Takes </title><description>Secuobs.com : 2015-03-03 19:13:05 -  ISC 2 Blog - With security attacks dominating news headlines, it s no secret that global cybersecurity professionals are in high demand According to the  ISC ² 2013 Global Information Security Workforce Study, two out of three C-level respondents reported security staff shortages The lack of skilled and qualified information security professionals is having a negative economic impact, with 56pourcents of respondents saying the staffing shortage is causing a huge impact on their organizations The call to action is clear  We need a global call to arms within academia to develop enough talent to fulfill this critical industry need I ve certainly heard the call loud and </description><link>http://www.secuobs.com/revue/news/561973.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/561973.shtml</guid></item>
<item><title>An Appeal to the White House on Behalf of the  ISC ² Membership</title><description>Secuobs.com : 2015-02-18 19:32:45 -  ISC 2 Blog - As the new executive director for  ISC ², one of my most critical goals is to be a global ambassador for our membership Recently, the US White House proposed reforms to the Computer Fraud and Abuse Act  CFAA  of 1986, which aim to prosecute those who exceed authorized access to online networks If this proposal is enacted by law, it could make it more difficult for cybersecurity practitioners to perform their jobs to defend their organizations against malicious threats Many  ISC ² members, with a high degree of professionalism and ethics, use tools that could fall under such prosecution for penetration testing </description><link>http://www.secuobs.com/revue/news/560095.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/560095.shtml</guid></item>
<item><title>What is a security expert </title><description>Secuobs.com : 2015-02-13 12:51:48 -  ISC 2 Blog -  Characteristics that make a security practitioner an expert in his field  Advanced theoretical knowledge proven by international certifications Practical experience in applying security Ability to communicate with all levels, according to their level of understanding, from board level to end-user Ability to find solutions which are not in books and prioritize them Ability to view the risks beyond the obvious and act upon - be proactive and not reactive Ability to choose a solution which represents a fair trade-off between security and usability </description><link>http://www.secuobs.com/revue/news/559463.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/559463.shtml</guid></item>
<item><title>Advice for Parents to Protect Children in an Advancing Cyber World</title><description>Secuobs.com : 2015-02-10 19:47:05 -  ISC 2 Blog - Protecting children from online dangers is no easy task for parents today There is no shortage of research offering insight into the concerns In the US, Internet filtering software company Covenant Eyes tells us that 54pourcents of girls are friends on social networks with someone they have never met in person  And, 74pourcents of children have been contacted by a stranger online Another study released today by the UK Safer Internet Centre, takes a look at the huge role that technology plays in supporting young people s friendships, with 55pourcents of the 150 11-to 16-year-olds who participated in their online survey </description><link>http://www.secuobs.com/revue/news/558915.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/558915.shtml</guid></item>
<item><title>Comments from  ISC ² Leadership on Health Insurer Anthem's Breach</title><description>Secuobs.com : 2015-02-05 19:57:20 -  ISC 2 Blog - The impact of an identity breach is potentially more dangerous and harmful than that of a credit card breach Credit card breaches are quickly mitigated by issuing a new card and account number   a routine process for card-issuing banks Even with massive credit card breaches, actual credit card fraud is low because banks are so adept at responding Identity attacks, such as the one on Anthem, will likely have a longer lasting and more devastating impact The disclosure of Social Security numbers and other data points such as income, employment status and birth dates allow attackers to sell this </description><link>http://www.secuobs.com/revue/news/558268.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/558268.shtml</guid></item>
<item><title>Maintaining the Relevancy of  ISC ² Certifications  CISSP and SSCP Credential Enhancements</title><description>Secuobs.com : 2015-01-15 15:38:55 -  ISC 2 Blog - Over our 26-year history,  ISC ² has earned a reputation for providing gold standard information security credentials Maintaining the relevancy of those credentials amidst the changes in technology and the evolving threat landscape occurring in this industry is a core strategy upon which this organization was built As a result of a rigorous, methodical process that  ISC ² follows to routinely update its credential exams, I m pleased to announce that enhancements will be made to both the Certified Information Systems Security Professional  CISSP  and Systems Security Certified Practitioner  SSCP  credentials, beginning April 15, 2015 We conduct this process on a regular basis </description><link>http://www.secuobs.com/revue/news/554814.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/554814.shtml</guid></item>
<item><title>Comments from  ISC ² Leadership on Obama's Call for 30-Day Breach Notification Policy for Hacked Companies</title><description>Secuobs.com : 2015-01-14 19:15:08 -  ISC 2 Blog - This proposal is a good start, but as always, the devil is in the details Implementing this legislation would require both planning and the right people in place to execute First, we need to consider how the term  breach  is defined   ie, what would need to happen to require notification  If breached data is encrypted, would that require notification  Note that most states currently have some form of encryption exemption in their data breach laws Second, the notification should be submitted in such a way so that the information is useful and doesn t result in a backlog which would </description><link>http://www.secuobs.com/revue/news/554649.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/554649.shtml</guid></item>
<item><title>CPE Policy Changes for  ISC ² Members Start This Month</title><description>Secuobs.com : 2015-01-08 18:14:23 -  ISC 2 Blog - Beginning this month,  ISC ² has a new annual continuing professional education  CPE  policy, which requires members to earn an equal number of CPEs each year within a three-year certification renewal period This policy was updated to help our members remain current on their CPEs on an annual basis, therefore, making the comprehensive three-year certification renewal process easier for them to manage We have experienced situations where many members found themselves significantly lacking CPEs during the last year of their cycles The new policy will apply to all new certification cycles starting on or after January 1, 2015 Continuing education is </description><link>http://www.secuobs.com/revue/news/553659.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/553659.shtml</guid></item>
<item><title>New  ISC ² Executive Director Introduction  Building on Our Successes   Striving for Excellence</title><description>Secuobs.com : 2015-01-05 15:15:18 -  ISC 2 Blog - I m pleased to start off 2015 as the new  ISC ² executive director As someone who has been entrusted with information security responsibilities throughout my career, I welcome the opportunity to speak out about the challenges we face on behalf of those working to keep our cyber world safe During my past two years as COO at  ISC ², I ve seen the organization make positive strides toward establishing a member focus  however, this is a sustained commitment with more work to be done I want to build on the momentum of our successes while continuing to evaluate areas that we need to </description><link>http://www.secuobs.com/revue/news/553066.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/553066.shtml</guid></item>
<item><title>2015 Cybersecurity Predictions  Bolstering Budgets and Growing and Crumbling Technologies </title><description>Secuobs.com : 2014-12-11 17:21:01 -  ISC 2 Blog - As security professionals, we look back at 2014 with a sense of frustration that we are facing major security breaches in the news daily This year has been our most challenging yet The world is now well aware that no single industry is immune to cybersecurity attacks   from retailers to financial institutions to hospitals and governments In fact, PricewaterhouseCoopers s 2015 The Global State of Information Security Survey found that the total number of security incidents detected by respondents climbed to 428 million this year, an increase of 48pourcents over 2013 Next year will certainly be riddled with challenges as </description><link>http://www.secuobs.com/revue/news/549725.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/549725.shtml</guid></item>
<item><title>2015 Cybersecurity Predictions  Security Moves into the C-Suite</title><description>Secuobs.com : 2014-12-09 21:28:30 -  ISC 2 Blog - The recent attack on Sony Pictures illustrates just how impactful a breach can be, and it will not be the last of its kind While there are minimal concrete root causes known about the Sony attack, we can infer from the extent of the breach that practices and controls surrounding information access, desktop security, and network intrusion monitoring and prevention will be in the crosshairs While defense and banking have held a 'do or die' approach to security for decades, many other organizations have passively entered an era where the means to destroy billions in shareholder value sits on central </description><link>http://www.secuobs.com/revue/news/549279.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/549279.shtml</guid></item>
<item><title>With Change Comes New Opportunities   ISC ² Executive Director Retirement</title><description>Secuobs.com : 2014-12-04 14:34:47 -  ISC 2 Blog - This is a bittersweet announcement to let you know I will be retiring from my role as  ISC 2 executive director at the end of 2014 I have always embraced change and, as a result, I am fortunate to have enjoyable, wide-ranging life experiences Working at  ISC 2 has been the highlight of my career I consider our 100,000 members, the staff and board members, past and present, a part of my extended family Over my six-and-a-half-year tenure, the organization has grown to more than 100,000 members worldwide  introduced three new certifications and subsequent education programs  established a non-profit Foundation  moved from </description><link>http://www.secuobs.com/revue/news/548486.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/548486.shtml</guid></item>
<item><title> ISC ² Global Research Program to Track Cybersecurity  Skills Gap and Landscape Now Open</title><description>Secuobs.com : 2014-12-03 16:27:27 -  ISC 2 Blog - In our digitally-driven world, it s crucial to have a current understanding of the evolving risks and responsibilities that information security professionals face The  ISC 2 Global Information Security Workforce Study  GISWS  is the only research available that truly offers a detailed picture of how the global cybersecurity professional is changing and driving other business factors A respected industry benchmark referenced by governments, employers, professionals, and industry stakeholders around the world for more than 10 years, this ongoing research provides much needed insight into current cybersecurity opportunities and trends experienced first-hand The study covers pay scales, skills and training requirements, hiring practices, </description><link>http://www.secuobs.com/revue/news/548322.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/548322.shtml</guid></item>
<item><title>Why Vote   </title><description>Secuobs.com : 2014-11-26 02:55:36 -  ISC 2 Blog - Your vote counts How  ISC ² members drive the direction of the organization In a recent election, the outcome was determined by a mere seven votes If you think your vote doesn t matter, think again You have five days left to participate in the  ISC ² Board of Directors elections, and with less than a week, we d like to remind you why your vote counts, and why your voice is vital What does your current Board of Directors think about elections   The nomination and election process is one of the most significant tasks we have each year,  notes board member Jennifer Minella </description><link>http://www.secuobs.com/revue/news/547289.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/547289.shtml</guid></item>
<item><title>US Postal Service Breach Comments from  ISC ² Leadership</title><description>Secuobs.com : 2014-11-10 23:18:37 -  ISC 2 Blog -  Unfortunately, this breach is just the latest in a series of incidents that have targeted the US government It seems this particular incident revealed information on individuals that could lead to targeted spear-phishing attacks towards USPS employees All of us need to be aware of potential phishing schemes, but in this particular case, USPS employees should be on the lookout for any suspicious email that would serve as a mechanism to extract additional information such as USPS intellectual property, credit card information and other types of sensitive data  -Dan Waddell, CISSP, CAP, Director of Government Affairs,  ISC ²  It seems as </description><link>http://www.secuobs.com/revue/news/544700.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/544700.shtml</guid></item>
<item><title>Protecting the Integrity of  ISC ² Certifications</title><description>Secuobs.com : 2014-11-05 22:57:39 -  ISC 2 Blog - There are recent reports of widespread cheating on certification exams in China, South Korea, and a few other countries As a CISSP-ISSEP and CAP, nothing is more important to me professionally or personally than my  ISC ² credentials I am proud of the credentials that I worked very hard to achieve And, I stand with more than 100,000 others worldwide who are certified by  ISC ² and recognize that certification is a privilege that must be legitimately earned and maintained During  ISC ² s 25 year history, candidates and members from around the world have looked to  ISC ² to deliver the highest caliber exams </description><link>http://www.secuobs.com/revue/news/543973.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/543973.shtml</guid></item>
<item><title> ISC ² Application Security Advisory Council Releases Set of Tips for More Secure Software</title><description>Secuobs.com : 2014-10-31 19:47:58 -  ISC 2 Blog - To celebrate the 11th annual National Cyber Security Awareness Month  NCSAM ,  ISC ² has released its fifth and final set of tips by its Application Security Advisory Council  tips for more secure software  Make sure your business functionality maps to a security plan  ie, security is built-in, not bolted-on  Design your software with the future in mind, not just of the now  ie, it is adaptable to talent-, technological- and threat- changes  Don t develop your software if your modus operandi is,  You start coding, I will go find out what they want  This is not agile programming  -Mano Paul, CISSP, CSSLP, </description><link>http://www.secuobs.com/revue/news/543390.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/543390.shtml</guid></item>
<item><title> ISC ² Releases Set of Cybersecurity Tips for CEOs</title><description>Secuobs.com : 2014-10-30 17:45:52 -  ISC 2 Blog - To celebrate the 11th annual National Cyber Security Awareness Month  NCSAM ,  ISC ² has released its fourth set of tips by security experts  cybersecurity tips for Chief Executive Officers  CEOs   Two-factor authentication  something you have, know, or are  has become very important for system access Passwords alone just do not cut it anymore This is extremely important as we see the rapid rise in financial transactions, particularly on mobile devices Ask your bank if two-factor authentication is available and if not, get another bank that does Credit card companies and online retailers are close behind They are not going to cover </description><link>http://www.secuobs.com/revue/news/543232.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/543232.shtml</guid></item>
<item><title>The New Face of  ISC ² Elections</title><description>Secuobs.com : 2014-10-29 21:41:49 -  ISC 2 Blog - A Message from the Board Communications Committee on Board Elections This year the  ISC ² Board of Directors election process emerges after a massive year-long facelift Through the recommendations of last year s Board of Directors and the tenacity of the  ISC ² Management team, this year marks an unprecedented shift as the organization adjusts election processes based on member feedback We really try to be problem-solvers, and with our emphasis on member service, making sure we aligned the election process to meet the changing demands of our membership was paramount this year You asked, we listened, and we have some exciting changes </description><link>http://www.secuobs.com/revue/news/543080.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/543080.shtml</guid></item>
<item><title> ISC ² Credentials and the Absolute Requirement for Experience</title><description>Secuobs.com : 2014-10-23 22:50:06 -  ISC 2 Blog - By  ISC ² Board Chair Wim Remes and  ISC ² Executive Director Hord Tipton When it comes to information security credentials,  ISC ² believes in the absolute requirement for experience  and this is a factor that leads to our organization often being referred to as the Gold Standard We are distinguished amongst certifying bodies because we stress the value of collaboration, experience, and continuous learning to both the  ISC ² membership and information security industry at large And we don t grandfather While the value of education is obviously crucial in our field, or really any industry for that matter, only so much information can </description><link>http://www.secuobs.com/revue/news/542405.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/542405.shtml</guid></item>
<item><title> ISC ² Releases Set of Cybersecurity Tips for Home Owners </title><description>Secuobs.com : 2014-10-21 17:47:01 -  ISC 2 Blog - To celebrate the 11th annual National Cyber Security Awareness Month  NCSAM ,  ISC ² has released its third set of tips by security experts  cybersecurity tips for home owners  Whatever browser you use  Chrome is best , make sure you are using the site evaluation tools available to help identify safe not-so-safe sites With this, you get a color-coded rating of the site before you visit You can also establish secure connections on most sites automatically through add-ons and extensions Don t advertise your router address name  SSID  Set it to hide Use WPA2 security protocol Most all routers now support it Use a password </description><link>http://www.secuobs.com/revue/news/541819.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/541819.shtml</guid></item>
<item><title> ISC 2 Global Research Program to Track Cybersecurity  Skills Gap and Landscape Now Open</title><description>Secuobs.com : 2014-10-20 17:05:45 -  ISC 2 Blog - In our digitally-driven world, it s crucial to have a current understanding of the evolving risks and responsibilities that information security professionals face The  ISC 2 Global Information Security Workforce Study  GISWS  is the only research available that truly offers a detailed picture of how the global cybersecurity professional is changing and driving other business factors A respected industry benchmark referenced by governments, employers, professionals, and industry stakeholders around the world for more than 10 years, this ongoing research provides much needed insight into current cybersecurity opportunities and trends experienced first-hand The study covers pay scales, skills and training requirements, hiring practices, </description><link>http://www.secuobs.com/revue/news/541473.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/541473.shtml</guid></item>
<item><title>JP Morgan attack highlights how basic failures in software expose major banks to amateur hackers</title><description>Secuobs.com : 2014-10-08 17:59:22 -  ISC 2 Blog -  The revelation that hackers were able to use widely-known vulnerabilities to burrow deep inside JP Morgan s computer systems-compromising some 76 million household accounts and 7 million small firms- shows that software with very basic flaws is still in widespread use at corporations, providing an easy route for experienced and amateur hackers What is even more disturbing is that, with so many basic flaws in commonly-used software, this attack may just be a  reconnaissance mission  to prepare the ground for much worse future attacks We now know the hackers gained a comprehensive A-Z of the apps and programmes that run on </description><link>http://www.secuobs.com/revue/news/539155.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/539155.shtml</guid></item>
<item><title>Shellshock Bug Comments from  ISC ² Leadership</title><description>Secuobs.com : 2014-09-26 22:18:18 -  ISC 2 Blog -  Shellshock will be a test of business resolve to prioritise security So much of the data breaches that make headlines today can be traced to old or known vulnerabilities that have not been addressed Now that shell shock has been revealed, and the door has been thrown open, it will be interesting to see if companies take action It is clear that the potential exposure is significant Linux underpins the majority of webservers, network routers and Apple s MAC PCs running OS X It is not clear, however, whether there has been any loss through successful exploitation of the flaw I </description><link>http://www.secuobs.com/revue/news/537085.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/537085.shtml</guid></item>
<item><title>eBay Breach Comments from  ISC ² Leadership</title><description>Secuobs.com : 2014-09-24 17:28:47 -  ISC 2 Blog - XSS   or cross site scripting  is a prolific vulnerability and has been on the Open Web Application Security Project s  Top 10 most exploited vulnerabilities  for at least five years now The threat is very common and incredibly easy for users to fall victim to In the OWASP s words, we can t afford to tolerate relatively simple security issues like this, especially for a company as massive as eBay Fortunately the methods and remedies to reduce the threat of XSS are well-known and are readily available Unfortunately, the development community are not recognising the need to deploy them Developers need to </description><link>http://www.secuobs.com/revue/news/536637.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/536637.shtml</guid></item>
<item><title>Moving Beyond the Dangerous Denial Phase as Individuals and Organizations</title><description>Secuobs.com : 2014-09-10 17:48:52 -  ISC 2 Blog - I spent 25 years in the Washington, DC area, and during that time I became a National Public Radio junkie I guess I still am I recently listened to a report on a comprehensive study about how people in the workplace react to the news about a coworker that s been diagnosed with breast cancer i  The results of the study shocked me The worse the diagnoses and the closer employees physically worked to the diagnosed coworker, the less likely those working in close proximity were to seek cancer screening Similarly, as the conversation about the complexities, costs, and potential breaches is </description><link>http://www.secuobs.com/revue/news/534255.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/534255.shtml</guid></item>
<item><title>Home Depot Breach Comments from  ISC ² Leadership</title><description>Secuobs.com : 2014-09-03 21:55:14 -  ISC 2 Blog - Consumers with a Home Depot credit account should log in to their account, change their password, and check the  Account Activity  section for any suspicious transactions They should also verify that their account communication preferences  email address, cell phone number for SMS, etc  are on file and accurate Home Depot and other online retailers should augment their alerting service by adding an option to notify users every time a transaction is made on their account This would help consumers learn about fraudulent charges quicker, while also saving retailers the hassle of remediating additional fraudulent charges- Dan Waddell, CISSP, CAP, PMP, </description><link>http://www.secuobs.com/revue/news/532865.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532865.shtml</guid></item>
<item><title>Where does Traditional Security Begin and Logical Security End   </title><description>Secuobs.com : 2014-09-02 17:46:21 -  ISC 2 Blog - By W Hord Tipton, CISSP, Executive Director,  ISC ² and Michael Stack, Chief Executive Officer, ASIS International The mass migration of everyday objects becoming interconnected, or the  Internet of Things  IoT  as the industry has coined it, exemplifies the merger between traditional and logical security With the IoT, we must ask ourselves where traditional security begins and logical security ends From security cameras to cars to medical devices and now even home appliances like refrigerators, what, if anything, can be identified as only traditional or logical security anym  When a device accesses the Internet, it s given a unique IP address,  said </description><link>http://www.secuobs.com/revue/news/532636.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532636.shtml</guid></item>
<item><title>Logging in  They Shall not Pass</title><description>Secuobs.com : 2014-08-30 20:44:53 -  ISC 2 Blog - Authentication, meme machines, and a farewell to acronyms </description><link>http://www.secuobs.com/revue/news/532320.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532320.shtml</guid></item>
<item><title>JP Morgan Chase Security Breach Comments from  ISC ² Leadership</title><description>Secuobs.com : 2014-08-28 22:44:20 -  ISC 2 Blog - Continuous monitoring is the key to thwarting these types of breaches With cyberattacks becoming commonplace in every sector, companies must continuously protect their most valuable information Cyber guns fire at us all the time, but the notion of catching and stopping every cybercriminal simply isn t realistic in today s burgeoning threat environment I liken it to aspiring to completely eliminate common street crime It s just not realistic Flaws will always exist, even within the most ideal protective structures Every company should assume they ll be breached, and focus efforts on minimizing damage once cybercriminals get in The need for qualified cybersecurity professionals </description><link>http://www.secuobs.com/revue/news/532057.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532057.shtml</guid></item>
<item><title>What Will Ease Healthcare's Heartburn Over 'Heartbleed' </title><description>Secuobs.com : 2014-08-22 23:53:14 -  ISC 2 Blog - One of the latest breaches to hit the news took place at Community Health Systems  CHS , affecting an estimated 45 million patients According to principal security consultant and founder of TrustedSec, David Kennedy, the initial attack vector was through the infamous OpenSSL  heartbleed  vulnerability that led to the compromise of the information What is especially noteworthy about this particular attack is its impact on the healthcare community Major data breaches such as the one at Target last year put the spotlight on how retailers need to do a better job at guarding our sensitive financial information from cyber criminals However, a May 2014 study by BitSight Technologies rated healthcare and pharmaceutical companies even worse than retailers in terms of security performance BitSight compared the performance of finance, utilities, retail, and healthcare groups within the S P 500 from April 2013 through March 2014 Overall, healthcare companies scored lowest, at about 660 on a scale of 250 to 900 Not only did the healthcare sector have the most security problems, but companies also took the longest to fix the problems on average 53 days, according to the report The importance of a strong vulnerability management and patching program is well documented but, as </description><link>http://www.secuobs.com/revue/news/531157.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/531157.shtml</guid></item>
<item><title>Introducing the Automotive Industry to Information Security  I Am The Cavalry Steers Call to Action</title><description>Secuobs.com : 2014-08-22 16:20:49 -  ISC 2 Blog - The Internet of Things  IoT  is already affecting nearly all aspects of life, and it s just getting started Some of the most promising IoT applications occur in the auto industry, but as technological innovation outpaces security, millions of Americans  physical safety is put at risk Cars can already parallel park themselves, steer you back into your lane if you start drifting, and automatically slow down if you get too close to the vehicle in front of you More and more cars are being controlled by computers, not humans It s not hard to envision cars of the near-future with the capability to drive from one place to another without a driver s interference You can relax while your car uses sensors to avoid obstacles, accesses the Internet to check traffic patterns, and checks your GPS to make sure you ve arrived at the appropriate destination  The in-dash espresso machine is an optional feature  This car of the future has a major flaw, though  security The auto industry needs to convince me that the onboard computers in my car are secure I don t want to ride in a car that a hacker can steer into an oncoming semi or direct to the wrong location </description><link>http://www.secuobs.com/revue/news/531083.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/531083.shtml</guid></item>
<item><title>Why we continue to fail on cyber security</title><description>Secuobs.com : 2014-07-30 15:43:10 -  ISC 2 Blog - I've been asked a lot of times, especially when I was working for an antivirus producer, why can't we simply write a software that always protects the users Well, there is a short answer and a long answer Short answer  </description><link>http://www.secuobs.com/revue/news/527611.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/527611.shtml</guid></item>
<item><title>The Luxury of Privacy</title><description>Secuobs.com : 2014-06-29 19:01:23 -  ISC 2 Blog - I was asked whether privacy is  a luxury of the past  Well, 'privacy' is a relative term in an online world </description><link>http://www.secuobs.com/revue/news/522739.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/522739.shtml</guid></item>
<item><title>So What is special about Infosecurity Europe </title><description>Secuobs.com : 2014-04-24 17:02:18 -  ISC 2 Blog - This year will be my 7th Infosecurity Europe as an  ISC 2 staff member For those who are not familiar, Infosecurity Europe  we call it  infosec  is the largest tradeshow for security professionals where 13,000 people meet over 3 days What </description><link>http://www.secuobs.com/revue/news/510139.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/510139.shtml</guid></item>
<item><title>Look to  ISC 2 for Cybersecurity Resources and Support for Academia</title><description>Secuobs.com : 2014-04-17 22:05:20 -  ISC 2 Blog - As  ISC 2 celebrates its 25th anniversary, we continue to branch out to offer new ways to help meet the demand for more skilled cybersecurity professionals through community support programs To help provide cybersecurity resources and support to the global academic </description><link>http://www.secuobs.com/revue/news/508994.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/508994.shtml</guid></item>
<item><title>Assessing decision-making skills of information security professionals is crucial for developing and sustaining talent</title><description>Secuobs.com : 2014-03-28 17:08:06 -  ISC 2 Blog - How have you assessed that decisions  made by your talent  will be made in line with security standards AND the vision and mission of your business  </description><link>http://www.secuobs.com/revue/news/505376.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/505376.shtml</guid></item>
<item><title>What will it take to Prioritize Security in Healthcare </title><description>Secuobs.com : 2014-02-28 16:42:03 -  ISC 2 Blog - With security breaches dominating news headlines daily, those responsible for securing our systems, networks, and devices are struggling to keep pace with the evolving threat landscape Perhaps some of the most concerning potential breach data comes from the healthcare industry </description><link>http://www.secuobs.com/revue/news/500503.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/500503.shtml</guid></item>
<item><title>Critical Times Demand Critical Skills    ISC ²  Research Report Analyzes InfoSec Skills Gap</title><description>Secuobs.com : 2014-02-20 22:37:38 -  ISC 2 Blog - When is a security professional not a security professional  When they re an analyst, a political scientist, a sociologist, an accountant, a communicator, and a risk manager A subset of the 2013  ISC 2 Global Information Security Workforce Study  GISWS  report,  Critical </description><link>http://www.secuobs.com/revue/news/499016.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/499016.shtml</guid></item>
<item><title> ISC ²  Enhances the Rigor of CISSP  Certification Exam Questions</title><description>Secuobs.com : 2014-02-06 22:32:51 -  ISC 2 Blog - One of our core processes for maintaining  ISC 2 s reputation for gold standard information security certifications involves frequent, rigorous evaluation of current certification exam questions and subsequent updates As a result of the last evaluation of the Certified Information Systems Security </description><link>http://www.secuobs.com/revue/news/496440.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/496440.shtml</guid></item>
<item><title>Food for Fraud  Android   Tech Support Scams</title><description>Secuobs.com : 2014-01-29 21:28:21 -  ISC 2 Blog - Android tech support scams  Not quite, but technical accuracy isn't a scammer's priority and Android users' money is as desirable as anyone else's If you read some of the recent reports based on an excellent article by Jérôme Segura for </description><link>http://www.secuobs.com/revue/news/494870.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/494870.shtml</guid></item>
<item><title>FREE Ways to Earn Continuing Professional Education  CPE  Credits for Your InfoSec Certification </title><description>Secuobs.com : 2014-01-14 16:13:44 -  ISC 2 Blog - You have earned your certification  Congratulations  Qualifying for, and studying for an InfoSec exam is not an easy task, and you should be proud of your accomplishment But once the glow of accomplishment has worn off and you have framed </description><link>http://www.secuobs.com/revue/news/491503.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/491503.shtml</guid></item>
<item><title>Technological Setbacks In 2013 Will Pave The Way For A New, Human-Focused Defense Strategy In 2014</title><description>Secuobs.com : 2013-12-20 21:40:00 -  ISC 2 Blog - After many major breaches this year, it s time to rethink 2014 s cyber defense with an eye on people, not products By W Hord Tipton, CISSP, Executive Director  ISC 2 As security professionals, we look back at 2013 with a sense of </description><link>http://www.secuobs.com/revue/news/487781.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/487781.shtml</guid></item>
<item><title>HealthCare Security   Privacy Professionals Defined</title><description>Secuobs.com : 2013-12-10 16:07:51 -  ISC 2 Blog - When I entered the workforce after college, my first job was with the Department of Defense working in IT for a military hospital I was quickly inundated with compliance requirements that spanned multiple industries and had varying levels of importance </description><link>http://www.secuobs.com/revue/news/485402.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/485402.shtml</guid></item>
<item><title>You should care about the EU Data Protection Regulation</title><description>Secuobs.com : 2013-11-26 16:10:28 -  ISC 2 Blog - It can be easy for an Information Security professional to watch the ongoing debate over Europe s pending Data Protection Regulation with a skeptical eye While parliamentarians dicker over the Right to Erasure  formerly known as the Right to Be Forgotten  and Privacy by Design, you re worried about practical matters like managing BYOD or preventing the next DDoS attack </description><link>http://www.secuobs.com/revue/news/483111.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/483111.shtml</guid></item>
<item><title>The sad state of Java security</title><description>Secuobs.com : 2013-11-26 00:03:32 -  ISC 2 Blog - The problem of Oracle is that they bought a technology that was stretched out to be actually  write once, run everywhere  The Virtual Machine that provides this functionality had to be ported to all devices, and lately  in the past </description><link>http://www.secuobs.com/revue/news/483011.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/483011.shtml</guid></item>
<item><title>Unlinking from LinkedIn</title><description>Secuobs.com : 2013-11-10 21:13:11 -  ISC 2 Blog - Like lots of people, I have an account on LinkedIn, the social networking website used by so many professionals in IT  and other areas, of course  It must be said though that at this point I don t access it much </description><link>http://www.secuobs.com/revue/news/480066.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/480066.shtml</guid></item>
<item><title>Some security metrics are worth sharing</title><description>Secuobs.com : 2013-10-11 03:41:57 -  ISC 2 Blog - Some security metrics are probably worth sharing and using more broadly than others, but which ones  And what makes them so special  </description><link>http://www.secuobs.com/revue/news/473967.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/473967.shtml</guid></item>
<item><title>Have you stopped sleeping with spooks </title><description>Secuobs.com : 2013-09-17 23:47:23 -  ISC 2 Blog - It s important to keep improving products as they move further and further away from static detection, but if we re to counter misinformation from other security sectors, we also need to make it clearer to our audiences and customers   not necessarily the same thing - what we really do and what they can realistically expect from us </description><link>http://www.secuobs.com/revue/news/469176.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/469176.shtml</guid></item>
<item><title>The virtual aspects of security</title><description>Secuobs.com : 2013-07-26 05:30:04 -  ISC 2 Blog - Security in the virtual world It's impressive as people abandon concepts due to simple  name changes  I'm referring here to network and system admins that stop deploying some traditional control measures as network segregation, traffic monitoring, security zones and others </description><link>http://www.secuobs.com/revue/news/459245.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/459245.shtml</guid></item>
<item><title>Of Mice and Men</title><description>Secuobs.com : 2013-07-12 13:57:52 -  ISC 2 Blog - I ve noticed a number of articles recently based on historical summaries of threats past   for instance, a  brief history of Apple hacking   see also my commentary for Infosecurity Magazine  and SC Magazine s Ten Devastating Computer Viruses In general, I m </description><link>http://www.secuobs.com/revue/news/456604.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/456604.shtml</guid></item>
<item><title>Honing your presentation skills for security awareness</title><description>Secuobs.com : 2013-06-21 01:28:15 -  ISC 2 Blog - Today on CISSPforum we've been chatting about Death by Powerpoint, the feeling that badly constructed and delivered presentations are not just tedious but counterproductive Notable examples include eye-candy, wordy slides, Where's Wally busy-pix, cool but distracting infographics and  When we </description><link>http://www.secuobs.com/revue/news/452770.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/452770.shtml</guid></item>
<item><title> ISC 2 s CCFP Credential   The Standard of Excellence in Cyber Forensics</title><description>Secuobs.com : 2013-06-10 21:12:23 -  ISC 2 Blog - Our cyber world is so rife with threats and breaches that most information security professionals have realized that a compromise is fairly certain at some point Rather than focus on this bleak reality, the important questions to ask are  After </description><link>http://www.secuobs.com/revue/news/450555.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/450555.shtml</guid></item>
<item><title>Security  for free </title><description>Secuobs.com : 2013-05-29 10:14:16 -  ISC 2 Blog - As security professionals, we are continuously facing the challenge of smaller and smaller budgets allocated to maintain and improve the IT security That s probably the main reason why there is always the temptation of  Free  Many people, sometimes even professionals, </description><link>http://www.secuobs.com/revue/news/448265.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/448265.shtml</guid></item>
<item><title>The evolution of support scamming</title><description>Secuobs.com : 2013-05-11 16:06:22 -  ISC 2 Blog - Cold-call tech support scams Didn't they go away when the Federal Trade Commission cracked down on them in the US  Actually, while the FTC crackdown wasn't quite as comprehensive as it might have seemed, there's no doubt that the number </description><link>http://www.secuobs.com/revue/news/444820.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/444820.shtml</guid></item>
<item><title>Secure Software Development   Closing the Gap between Risk Awareness and Response</title><description>Secuobs.com : 2013-04-15 20:41:41 -  ISC 2 Blog - by Mano Paul, CISSP, CSSLP, MCSD, MCAD, CompTIA Network , ECSA As highlighted in the recently released 2013 Global Information Security Workforce Study  GISWS    the largest vendor-neutral study of its kind conducted by  ISC 2 and analyst firm Frost   Sullivan </description><link>http://www.secuobs.com/revue/news/439594.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/439594.shtml</guid></item>
<item><title>Flight risk</title><description>Secuobs.com : 2013-04-12 00:51:49 -  ISC 2 Blog - An amateur pilot has reportedly assembled and hacked real aircraft cockpit systems, demonstrating their vulnerabilities  Security researcher Hugo Teso was able to  hijack  the systems to feed false navigation information to a simulated jet that made it change course  BBC </description><link>http://www.secuobs.com/revue/news/439047.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/439047.shtml</guid></item>
<item><title>A Career in Science and Technology   from Nuclear Engineering to Cyber Security</title><description>Secuobs.com : 2013-04-09 15:38:48 -  ISC 2 Blog - By  Hord Tipton One chooses their career path for different reasons   whether it be following in a parent s footsteps or an innate desire to help others I was inspired by a chemistry teacher to pursue a career in chemical </description><link>http://www.secuobs.com/revue/news/438383.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/438383.shtml</guid></item>
<item><title>Technology that compels reasonable people to make questionable choices</title><description>Secuobs.com : 2013-03-12 15:38:31 -  ISC 2 Blog - Parents, have you heard of Snapchat  It was the first messaging applications, referred to as ephemeral technology, that allows one to send an image or video to one person or a group of people This doesn't sound either new or </description><link>http://www.secuobs.com/revue/news/432972.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/432972.shtml</guid></item>
<item><title>Define SMART IT security goals</title><description>Secuobs.com : 2013-02-14 17:57:30 -  ISC 2 Blog - One of the biggest problem that most IT security experts around the world have is the fact that IT security is never taken seriously until a security incident takes place After that, management boards start being interested in IT security </description><link>http://www.secuobs.com/revue/news/427802.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/427802.shtml</guid></item>
<item><title>Controlling the load into your services and applications</title><description>Secuobs.com : 2013-02-10 20:22:23 -  ISC 2 Blog - Administrators are occasionally faced with the task to size their applications farms properly so it can sustain network growth for the years to come They follow all the best practices  Understanding the company objectives and upcoming Internet related projects Establishing </description><link>http://www.secuobs.com/revue/news/426832.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/426832.shtml</guid></item>
<item><title>Safe and Secure Online Launches in Switzerland on Safer Internet Day</title><description>Secuobs.com : 2013-02-05 20:21:25 -  ISC 2 Blog - By Julie Peeler A Safe and Secure Online volunteer was asked by a child,  If I tell someone, will it stop  Just imagine the impact you can have in shaping a child s life by having the skills to answer a </description><link>http://www.secuobs.com/revue/news/425918.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/425918.shtml</guid></item>
<item><title>PPI Scams in the UK and Ireland</title><description>Secuobs.com : 2013-01-29 17:51:45 -  ISC 2 Blog - PPI  Payment Protection Insurance  has been a hot potato in the UK for some years There has long been widespread concern that the insurance, frequently added on to loans, mortgages and overdrafts, was frequently sold in circumstances inappropriate to the </description><link>http://www.secuobs.com/revue/news/424487.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/424487.shtml</guid></item>
<item><title>The PC is dead, long live the PC</title><description>Secuobs.com : 2013-01-16 16:29:08 -  ISC 2 Blog - If you have read news lately, you couldn t have missed hearing how well the tablets, smart phones and smart TVs are selling, and how badly the PC market  excluding laptops  is doing Many so called  futurists  have predicted the passing </description><link>http://www.secuobs.com/revue/news/422077.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/422077.shtml</guid></item>
<item><title>Vulnerability disclosure  a new business model </title><description>Secuobs.com : 2013-01-14 17:04:35 -  ISC 2 Blog - We all see in the mass media every day that software is vulnerable and that this is bad But, few know what is happening behind the scene, until the news get out There are two ways to disclosure a vulnerability  </description><link>http://www.secuobs.com/revue/news/421636.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/421636.shtml</guid></item>
<item><title>Safe   Secure Volunteer Presentation Tips</title><description>Secuobs.com : 2013-01-09 15:54:37 -  ISC 2 Blog - Happy New Year to all As promised in my Dec 21 blog, here are some tips that I would like to pass on, from my experience presenting to four different middle school groups in October last year, from grades 5 </description><link>http://www.secuobs.com/revue/news/420697.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/420697.shtml</guid></item>
<item><title>Safe   Secure Online Volunteer Experience</title><description>Secuobs.com : 2012-12-21 17:13:48 -  ISC 2 Blog - It was a typical work day for me, chaotic and intense, as we all have experienced in the information systems security field, as we go to our offices each day and perform our duties as information security professionals The job </description><link>http://www.secuobs.com/revue/news/418297.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/418297.shtml</guid></item>
<item><title>Federal Cloud Computing  The Definitive Guide for Cloud Service Providers</title><description>Secuobs.com : 2012-12-20 02:12:36 -  ISC 2 Blog - Federal Cloud Computing  The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation You </description><link>http://www.secuobs.com/revue/news/417960.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/417960.shtml</guid></item>
<item><title>There s Testing, Then There s VirusTotal</title><description>Secuobs.com : 2012-12-10 15:17:03 -  ISC 2 Blog - From time to time, I find myself having to rail against the misuse of VirusTotal s service as a sort of surrogate AV product test Sadly, I feel the need to do it again here, in the light of a current news item </description><link>http://www.secuobs.com/revue/news/416067.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/416067.shtml</guid></item>
<item><title>Making the users accountable</title><description>Secuobs.com : 2012-12-01 03:41:16 -  ISC 2 Blog - We all know that information security relays on a layered approach It s about people, process programs and technology And we all know about Advanced Persistent Threats How they work, attack vectors, etc And even so, more and more companies are attacked </description><link>http://www.secuobs.com/revue/news/414540.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/414540.shtml</guid></item>
<item><title>FedRAMP  A progress report from a 3PAO</title><description>Secuobs.com : 2012-11-28 18:24:19 -  ISC 2 Blog - The Federal government s cloud first policy is in full swing It has been 6 months since the Federal Risk and Authorization and Management Program  FedRAMP  was granted initial operating capability to streamline cloud security management and vendor approvals in an </description><link>http://www.secuobs.com/revue/news/413902.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/413902.shtml</guid></item>
<item><title>Are We Ready To Fight The Next Generation Of Threats   New  ISC 2 Survey Lets You Give The Answer</title><description>Secuobs.com : 2012-11-21 20:01:19 -  ISC 2 Blog - By Greg J Thompson, CISSP, Vice President, Enterprise Security Services, Scotiabank As security professionals, we understand the concept of risk These days, most of the risk discussion centers around the evolution of new threats, the presence of known and unknown </description><link>http://www.secuobs.com/revue/news/412755.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/412755.shtml</guid></item>
<item><title>Take Charge of Your  ISC 2 Membership   Vote in the Board of Director Elections</title><description>Secuobs.com : 2012-11-16 21:52:34 -  ISC 2 Blog - Today marks the start of an important official process for  ISC 2   the annual Board of Director elections The Board is responsible for providing governance and oversight for the organization, granting credentials to qualified candidates, and enforcing adherence to the </description><link>http://www.secuobs.com/revue/news/411917.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/411917.shtml</guid></item>
<item><title>The 2013 Global Information Security Workforce Study is important for all of us</title><description>Secuobs.com : 2012-10-26 21:38:06 -  ISC 2 Blog - The 2013 Information Security Workforce study needs your input  </description><link>http://www.secuobs.com/revue/news/408080.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/408080.shtml</guid></item>
<item><title>Information Security Assurance for Executives</title><description>Secuobs.com : 2012-10-26 21:38:06 -  ISC 2 Blog - Information Security Assurance for Executives An international business companion to the 2002 OECD Guidelines for the Security of Networks and Information Systems  Towards a Culture of Security Although I was already familiar with the original OECD paper, I only recently </description><link>http://www.secuobs.com/revue/news/408079.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/408079.shtml</guid></item>
<item><title>Password Practice  With Age Comes Wisdom </title><description>Secuobs.com : 2012-10-19 22:09:48 -  ISC 2 Blog - My friend and colleague Stephen Cobb has shared some interesting survey data in a blog article indicating that the age group between 18 and 34 is less likely than older groups to use complex passwords or even to use different </description><link>http://www.secuobs.com/revue/news/406725.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/406725.shtml</guid></item>
<item><title>Responsible Digital Citizenship   A Year-Round, Lifelong Pursuit</title><description>Secuobs.com : 2012-10-19 18:51:48 -  ISC 2 Blog - With  ISC ² being a supporter of US National Cyber Security Awareness Month every year since its inception, it strikes me that many more organizations are getting involved this year   maybe more than ever before I asked myself what s changed </description><link>http://www.secuobs.com/revue/news/406678.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/406678.shtml</guid></item>
<item><title>Don t Forget About ID Thieves and Online Predators during NCSA Month  5 Tips for Protecting and Educating Your Children </title><description>Secuobs.com : 2012-10-17 16:04:28 -  ISC 2 Blog - With National Cyber Security Awareness Month in full stride, parents are realizing the vulnerability of their children and the necessity for cyber safety education Although numerous types of cybercrime are being discussed this month, I d like to examine two areas </description><link>http://www.secuobs.com/revue/news/406180.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/406180.shtml</guid></item>
<item><title>Mitigating against a Certificate Authority Breach</title><description>Secuobs.com : 2012-10-03 22:39:11 -  ISC 2 Blog - What would you do if you found out that the Certificate Authority that provides Digital Certificates to your company was compromised, and Microsoft was adding the Certificate Authority s public key to Windows un-trusted Root Store  Well if you have not </description><link>http://www.secuobs.com/revue/news/403433.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/403433.shtml</guid></item>
<item><title>Another eruption East of Java</title><description>Secuobs.com : 2012-09-03 12:53:12 -  ISC 2 Blog - Do you trust Oracle to do better from now on  Do you need Java anyway  If enough  apps and services  reconsider their dependence on an unpopular service, and then Oracle will really have a problem  But  responsible disclosure demands responsible  and responsive  remediation </description><link>http://www.secuobs.com/revue/news/397296.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/397296.shtml</guid></item>
<item><title>Server side attacks vs User side attacks</title><description>Secuobs.com : 2012-08-20 23:54:04 -  ISC 2 Blog - I was on a  road show  in the last months talking to customers about new waves of attacks and how they re designed to avoid traditional detection capabilities What was impressive for me during those events were some concerns raised by </description><link>http://www.secuobs.com/revue/news/394716.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/394716.shtml</guid></item>
<item><title>Social engineering trumps Wal-Mart customer service</title><description>Secuobs.com : 2012-08-09 22:33:27 -  ISC 2 Blog - This year's social engineering 'capture the flag' competition at the DefCon hackers' conference was won by a contestant who does social engineering for a living In the course of a 20 minute phone call, he successfully fooled a Wal Mart </description><link>http://www.secuobs.com/revue/news/392723.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/392723.shtml</guid></item>
<item><title>Habitual security - the way we do things</title><description>Secuobs.com : 2012-06-10 12:16:45 -  ISC 2 Blog - A short thought-provoking piece about changing security habits in order to develop a culture of security </description><link>http://www.secuobs.com/revue/news/380661.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/380661.shtml</guid></item>
<item><title>Sources of Stress for Information Security Workers</title><description>Secuobs.com : 2012-06-07 16:53:28 -  ISC 2 Blog - Working in information security can, without doubt, at times prove extremely stressful Sometimes it seems you have so many things to keep track of, the task can feel almost impossible Deadlines A server that won t install an update A missing </description><link>http://www.secuobs.com/revue/news/380148.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/380148.shtml</guid></item>
<item><title>Data leakage in social media</title><description>Secuobs.com : 2012-05-21 21:26:55 -  ISC 2 Blog - Perhaps a good psychiatrist can explain why millions of people have this compulsive urge to put almost everything they do on a social networking site Whatever is your motivation for using a social networking site, it must be clearly understood </description><link>http://www.secuobs.com/revue/news/376740.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/376740.shtml</guid></item>
<item><title>Bullet-proofing messengers</title><description>Secuobs.com : 2012-05-19 01:26:10 -  ISC 2 Blog - OPINION  A troubling article in Forbes raises concerns about how society takes care of those who raise legitimate, well-founded concerns about their employers Aside from the specific legal decision in this particular case, there is a wider issue about protecting </description><link>http://www.secuobs.com/revue/news/376451.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/376451.shtml</guid></item>
<item><title>Dotted lines in shifting sands</title><description>Secuobs.com : 2012-05-15 00:04:58 -  ISC 2 Blog - An opinion piece regarding a possible US law change raises fascinating ethical questions about privacy rights Whereas employers have some interest in what their employees are saying and doing in their personal non-work time, employees also have reasonable expectations of privacy </description><link>http://www.secuobs.com/revue/news/375485.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/375485.shtml</guid></item>
<item><title>Security Provisions In Software Development Contracts - Who Pays </title><description>Secuobs.com : 2012-05-14 21:34:44 -  ISC 2 Blog - In the last few years, there has been a rise in the number of security vulnerabilities in software and applications which has ultimately led to huge losses in terms of money, trust and morale of the people using the software </description><link>http://www.secuobs.com/revue/news/375469.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/375469.shtml</guid></item>
<item><title>The Ethics of White Hat Hacking</title><description>Secuobs.com : 2012-05-11 18:28:21 -  ISC 2 Blog - From the early hacker culture that took its form and shape at the Massachusetts Institute of Technology  MIT  during the late 50s and early 60s to the present day groups of hackers, a lot has changed in the world of </description><link>http://www.secuobs.com/revue/news/375079.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/375079.shtml</guid></item>
<item><title>FedRAMP 3PAO Program   Have we Heard of this Idea Before </title><description>Secuobs.com : 2012-04-22 00:56:48 -  ISC 2 Blog - In a packed auditorium in 2006, I recall sitting in the  Red Auditorium  at NIST to participate in a workshop hosted by the Computer Security Division The goal of the workshop was to discuss the implementation of Phase II of </description><link>http://www.secuobs.com/revue/news/371288.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/371288.shtml</guid></item>
<item><title>Counter eCrime Operations Summit, AMTSO, CARO meetings</title><description>Secuobs.com : 2012-04-17 12:33:40 -  ISC 2 Blog - Apologies for including content that I've already used elsewhere, but I know that these are events that will interest some readers of this blog Most urgently  the CeCOS cybercrime summit in Prague, 25-27 April This year's theme is Containing the </description><link>http://www.secuobs.com/revue/news/370377.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/370377.shtml</guid></item>
<item><title>Security Breach in CA Networks -Comodo, DigiNotar, GlobalSign</title><description>Secuobs.com : 2012-04-04 17:04:57 -  ISC 2 Blog - by Ravi Mandalia Executive Summary Since March, 2011 more and more Cyber attacks are surfacing across the globe with damaging consequences both for the companies that faced the attacks and for the customers whose details were stolen One such attack </description><link>http://www.secuobs.com/revue/news/368012.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/368012.shtml</guid></item>
<item><title>EU organizations below par on infosec</title><description>Secuobs.com : 2012-04-03 04:10:18 -  ISC 2 Blog - A study into the information security practices of 600 mid-sized European businesses by PwC and Iron Mountain paints a disappointing picture of their state of maturity Their overall score comes out at 406 on a scale ranging from 0  dreadful  </description><link>http://www.secuobs.com/revue/news/367701.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/367701.shtml</guid></item>
<item><title>Practice Safe Computing</title><description>Secuobs.com : 2012-04-02 22:28:57 -  ISC 2 Blog - by F Gary Alu What is the first thing we should check when we turn on our computer  That s a question I always pose to the kids when I present the  ISC 2 Safe and Secure Online Program If your answer </description><link>http://www.secuobs.com/revue/news/367646.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/367646.shtml</guid></item>
<item><title>Selecting a 3PAO with assessors that have the Certificate of Cloud Security Knowledge  CCSK </title><description>Secuobs.com : 2012-04-01 15:20:06 -  ISC 2 Blog - The CCSK is NOT meant to be a substitute for other certifications in information security, audit and governance The CCSK augments other credentialing programs like the CISSP, CAP, CSSLP, etc However, the CCSK does provide a valuable selector for organizations </description><link>http://www.secuobs.com/revue/news/367445.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/367445.shtml</guid></item>
<item><title>IT's stranglehold loosens another notch</title><description>Secuobs.com : 2012-03-30 08:21:42 -  ISC 2 Blog - The popularity of portable computing, BYOD and cloud computing services is forcing some IT departments onto the back foot, as business people are gradually regaining control of their own destinies Perhaps I'm showing my age here but the current power-play </description><link>http://www.secuobs.com/revue/news/367103.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/367103.shtml</guid></item>
<item><title> ISC ² Foundation Honors Founder and Legend Harold F  Hal  Tipton with Memorial Scholarship </title><description>Secuobs.com : 2012-03-29 18:22:59 -  ISC 2 Blog - By W Hord Tipton, CISSP-ISSEP, CAP, CISA, Executive Director,  ISC ² I suppose it s only natural to think about carrying on tradition and looking to the next generation after the initial reflection period has subsided when someone passes away What innovations </description><link>http://www.secuobs.com/revue/news/366970.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/366970.shtml</guid></item>
<item><title>So what is the Certificate of Cloud Security Knowledge  CCSK  anyway </title><description>Secuobs.com : 2012-03-25 20:24:17 -  ISC 2 Blog - In July 28, 2010, the Cloud Security Alliance  CSA , with support from many within the industry, launched  the industry s first user certification program for secure cloud computing  Since the initial set of early adopters, which include over 80 professionals across </description><link>http://www.secuobs.com/revue/news/366023.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/366023.shtml</guid></item>
<item><title>Memories of Hal Tipton</title><description>Secuobs.com : 2012-03-20 15:28:13 -  ISC 2 Blog - I'd like to take this opportunity to pass along some memories of our good friend Hal Tipton From John O'Leary, CISSP Hal Tipton was not only one of the founding fathers of  ISC 2, he was a unique individual - one </description><link>http://www.secuobs.com/revue/news/364886.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/364886.shtml</guid></item>
<item><title>Anonymous attacks against the DNS Root Servers What's true and what's not </title><description>Secuobs.com : 2012-03-20 04:55:30 -  ISC 2 Blog - It's widely known by now, that the Internet group called  Anonymous  is targeting an amplification attack against the DNS Root Servers Much has been said about it and different people have different opinions Here's mine To get to my point </description><link>http://www.secuobs.com/revue/news/364763.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/364763.shtml</guid></item>
<item><title>In memory of Mr Harold F Tipton</title><description>Secuobs.com : 2012-03-19 19:27:13 -  ISC 2 Blog - It is with a heavy heart that I write this entry As many of you likely already know, we lost a great information security warrior on Friday At the age of 89, Mr Harold F Tipton, a founder of  ISC ², </description><link>http://www.secuobs.com/revue/news/364656.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/364656.shtml</guid></item>
<item><title>2012 a New Era for  ISC ² s Arsenal of Certification Exams </title><description>Secuobs.com : 2012-03-05 16:25:22 -  ISC 2 Blog - 2012 a New Era for  ISC ² s Arsenal of Certification Exams By W Hord Tipton, CISSP-ISSEP, CAP, CISA, Executive Director,  ISC ² 2012 marks a new era for  ISC 2 This year, the last of our arsenal of certification exams will be transitioned </description><link>http://www.secuobs.com/revue/news/361451.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/361451.shtml</guid></item>
<item><title>Secured by SSL Not Enough</title><description>Secuobs.com : 2012-02-27 22:07:46 -  ISC 2 Blog - You are on the internet and you are looking to purchase the latest smart phone online So you start off doing a search in Google So you get a list of maybe three potential web sites selling the brand you </description><link>http://www.secuobs.com/revue/news/360206.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/360206.shtml</guid></item>
<item><title>Android, Malware and Rehabilitation</title><description>Secuobs.com : 2012-02-07 00:52:27 -  ISC 2 Blog - With news breaking of a further wave of  fake malware-laden apps , let's hope that Google has seen ENISA's analysis of appstore security, and will not assume that Bouncer app review is enough </description><link>http://www.secuobs.com/revue/news/356288.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/356288.shtml</guid></item>
<item><title>PKI and Importance of Security Policy</title><description>Secuobs.com : 2012-02-02 23:38:06 -  ISC 2 Blog - For this example let us presume that the business has stipulated that users must use digital certificates to authenticate to their application One of the main functions of a CA is to verify the identity of the entity requesting a </description><link>http://www.secuobs.com/revue/news/355676.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/355676.shtml</guid></item>
<item><title>Second Annual  ISC ²  Security Congress Registration and Call for Speakers Open</title><description>Secuobs.com : 2012-01-31 21:42:10 -  ISC 2 Blog - By W Hord Tipton, CISSP-ISSEP, CAP, CISA, Executive Director,  ISC ² Last September, we held our first annual  ISC ² Security Congress event in Orlando, and the feedback we received from our members is that it was a great learning and networking </description><link>http://www.secuobs.com/revue/news/355110.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/355110.shtml</guid></item>
<item><title>Keeping Your Information Private  Tips and Tricks for Data Privacy Day </title><description>Secuobs.com : 2012-01-28 00:02:29 -  ISC 2 Blog - By Julie Peeler,  ISC 2 Foundation Director Tomorrow marks Data Privacy Day and while it may not be a national holiday, it s a great opportunity to take a step back and evaluate our personal data privacy and security measures Over the </description><link>http://www.secuobs.com/revue/news/354542.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/354542.shtml</guid></item>
<item><title>What s up for 2012 </title><description>Secuobs.com : 2012-01-24 08:02:01 -  ISC 2 Blog - Talking of customers, CSO s, engineers and other IT security people could give me some insights of what companies are looking for in 2012 in terms of overall IT security Far from a reality or a survey, this is more my </description><link>http://www.secuobs.com/revue/news/353711.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/353711.shtml</guid></item>
<item><title>Redefining United States Cyber Security  Taking a Holistic View and Machiavellian Approach, part 2</title><description>Secuobs.com : 2012-01-18 15:55:46 -  ISC 2 Blog - 3 Background In the years since I took my first IT security position in 1999, the cyber security landscape has changed vastly Fortunately, there has been an awakening within the entire information technology security community in the years since 9-11 </description><link>http://www.secuobs.com/revue/news/352699.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/352699.shtml</guid></item>
<item><title>2012  Redefining United States Cyber Security  Taking a Holistic View and Machiavellian Approach, part 1 </title><description>Secuobs.com : 2012-01-13 22:23:22 -  ISC 2 Blog - By  Larry P Bunch CISSP, CEH http mysiteverizonnet vze18ez5m id3html Twitter  https twittercom bunchlarryp Preface This article was originally intended to be a light reading OP ED piece However, it has slowly evolved into a hybrid OP ED   Whitepaper dealing with Cyber Intelligence and Network Security </description><link>http://www.secuobs.com/revue/news/352030.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/352030.shtml</guid></item>
<item><title>Moving Health Care Data Safely to the Cloud   It Can be Done  </title><description>Secuobs.com : 2012-01-11 17:06:35 -  ISC 2 Blog - By W Hord Tipton, CISSP-ISSEP, CAP, CISA, Executive Director,  ISC ² A few weeks ago, I was at my doctor s office, and the topic of the cloud came up You may think this is a strange topic of conversation between a </description><link>http://www.secuobs.com/revue/news/351498.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/351498.shtml</guid></item>
<item><title>Are You Famous, Dada  A Dedication of the Americas ISLA Award to Future Generations</title><description>Secuobs.com : 2011-12-28 18:11:13 -  ISC 2 Blog - By Mano Paul, CSSLP, CISSP, ECSA, AMBCI, MCSD, MCAD, CompTIA Network   On our flight to Austin, back from Orlando, on the 22nd September 2011, our five year old son, Reuben, asked me  Are you famous, dada  Before I tell </description><link>http://www.secuobs.com/revue/news/349280.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/349280.shtml</guid></item>
<item><title>Keeping Kids Safe and Secure This Holiday Season</title><description>Secuobs.com : 2011-12-21 17:09:31 -  ISC 2 Blog - By Julie Peeler,  ISC 2 Foundation Director When I was a kid, all I wanted was a 10-speed bike for Christmas Back then, my bike came with a lock so I could keep it safe forever Nowadays, kids don t always want </description><link>http://www.secuobs.com/revue/news/348445.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/348445.shtml</guid></item>
<item><title>Security Integration, Risk Management, and Security Congress   Works In Progress</title><description>Secuobs.com : 2011-12-19 16:59:29 -  ISC 2 Blog - By W Hord Tipton, CISSP-ISSEP, CAP, CISA, Executive Director,  ISC ² The first annual ASIS and  ISC ² Security Congress event was held in Orlando in September, and for those who attended, it was a major success Our members made the most </description><link>http://www.secuobs.com/revue/news/348002.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/348002.shtml</guid></item>
<item><title>Security Not Often a Top Priority for Small Business</title><description>Secuobs.com : 2011-12-08 19:29:53 -  ISC 2 Blog - I recently found an article that outlined a study about cyber security and small businesses In the study, by Newtek Business Services  Small Business Authority, it was discovered that  just 27 percent of small business owners have had an outside </description><link>http://www.secuobs.com/revue/news/346148.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/346148.shtml</guid></item>
<item><title>Applying Newton's third law to information security</title><description>Secuobs.com : 2011-11-29 23:16:17 -  ISC 2 Blog - Simply banning stuff  such as using social media at work  through management edict or policy can be counterproductive for security if employees react by circumventing the ban I argue that effective security awareness using motivation and persuasion is a far more effective technique </description><link>http://www.secuobs.com/revue/news/344445.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/344445.shtml</guid></item>
<item><title>Making Cyber Security Awareness a Year-Round Pursuit</title><description>Secuobs.com : 2011-11-21 23:36:44 -  ISC 2 Blog - It s hard to believe we re almost through November and that National Cyber Security Awareness Month  NCSAM   October  has come and gone As we enter the busiest online shopping season of the year, however, I challenge you to reflect on the </description><link>http://www.secuobs.com/revue/news/341858.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/341858.shtml</guid></item>
<item><title>DNSSEC, SOPA, and PIPA</title><description>Secuobs.com : 2011-11-16 16:03:15 -  ISC 2 Blog - Many are concerned that the current forms of SOPA and PIPA, will be ineffective, and will hamper other attempts to make the internet safer </description><link>http://www.secuobs.com/revue/news/340998.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/340998.shtml</guid></item>
<item><title>Cast Your Vote   ISC ² Board of Directors Election Begins Nov 16, 2011</title><description>Secuobs.com : 2011-11-09 18:29:28 -  ISC 2 Blog - As we approach the opening of the elections for the 2012  ISC ² Board of Directors, I want to encourage all  ISC ² members to vote  Log in to the member Website between 8 am ET 16 Nov and 5 pm ET </description><link>http://www.secuobs.com/revue/news/339765.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/339765.shtml</guid></item>
<item><title>Focus on everything</title><description>Secuobs.com : 2011-10-25 04:45:47 -  ISC 2 Blog - I had the opportunity to visit several companies over the years and in many cases I could verify that their network and security teams suffered of a lack of network visibility, which let them unable to answer some important questions, </description><link>http://www.secuobs.com/revue/news/336665.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/336665.shtml</guid></item>
<item><title>The APT Attack Surface</title><description>Secuobs.com : 2011-09-21 15:11:59 -  ISC 2 Blog - According to the FAS Project on Government Secrecy, using data tabulated in the report, 4,266,091 people held security clearances in the US for access to classified information </description><link>http://www.secuobs.com/revue/news/330148.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/330148.shtml</guid></item>
<item><title>40 hard-won business continuity lessons from the NZ and Japan quakes</title><description>Secuobs.com : 2011-09-20 22:36:57 -  ISC 2 Blog - Article draws 40 business continuity lessons from earthquakes in NZ and Japan </description><link>http://www.secuobs.com/revue/news/330026.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/330026.shtml</guid></item>
<item><title> ISC 2 board candidates</title><description>Secuobs.com : 2011-09-11 03:01:59 -  ISC 2 Blog - I'm not 100pourcents au fait with ISC2's board election process but as I understand it the sitting board proposes a bunch of candidates, while the general membership can propose their own  independent candidates  as well If you aren't into nepotism </description><link>http://www.secuobs.com/revue/news/328195.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/328195.shtml</guid></item>
<item><title>What are we missing on Internet 20 attacks </title><description>Secuobs.com : 2011-07-05 00:38:53 -  ISC 2 Blog - During the last months several companies were victims of attacks  DDOS, steal of database records, websites defacement, leak of sensitive information, etc  and we could watch on first sight how bad prepared many of them were Some of them have </description><link>http://www.secuobs.com/revue/news/315119.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/315119.shtml</guid></item>
<item><title>Requesting a Credit Report</title><description>Secuobs.com : 2011-06-18 00:04:04 -  ISC 2 Blog - One of the best ways to combat identity theft is through the consistent monitoring of your credit report Over the years, your credit report was a closely-guarded secret of the 3 major credit reporting agencies  Experian, TransUnion, and Equifax  You </description><link>http://www.secuobs.com/revue/news/312086.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/312086.shtml</guid></item>
<item><title>Doom is Busting Out All Over</title><description>Secuobs.com : 2011-06-09 17:08:13 -  ISC 2 Blog - The cold war is back  if it ever really went away  Only now, anyone can play Nations - including the UK, where I have the pleasure of residing - are queueing up to announce that they're developing cyberwarrior capabilities </description><link>http://www.secuobs.com/revue/news/310182.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/310182.shtml</guid></item>
<item><title>IPV6 is on a blink of eye to be a reality on our daily lives Is it ready for our world </title><description>Secuobs.com : 2011-05-31 21:44:28 -  ISC 2 Blog - Well, IPV4 addresses are almost depleted, right  Sort of, it s clear that we will be out of IPv4 addresses in 2011, some actual almost  live  info I received mentioned that we had left only 12 8 s and 11 256 s by the end </description><link>http://www.secuobs.com/revue/news/308242.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/308242.shtml</guid></item>
<item><title>The Role of a SIEM in an Overall Enterprise Security Plan</title><description>Secuobs.com : 2011-05-17 19:24:17 -  ISC 2 Blog - An overall Enterprise Security plan will be comprised of many different moving pieces An effective plan will have all of these pieces in place and working together like a fine tuned machine Managing this plan and taking in all of </description><link>http://www.secuobs.com/revue/news/305413.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/305413.shtml</guid></item>
<item><title>50pourcents discount on Auerbach CRC Press books</title><description>Secuobs.com : 2011-05-03 00:34:41 -  ISC 2 Blog - Here's an excellent reason to join ISSA assuming you are not already enjoying the benefits of belonging to this friendly, supportive and global community of information security professionals, most of whom are CISSPs ISSA members can buy Auerbach CRC Press books </description><link>http://www.secuobs.com/revue/news/302123.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/302123.shtml</guid></item>
<item><title>Epsilon Overkill and the Security Ecology</title><description>Secuobs.com : 2011-04-08 14:07:08 -  ISC 2 Blog - I'm not actually going to write about the Epsilon fiasco as such here I can think of at least two journalists who will be grateful for that, but I'm not going to let them off quite that easily, even though </description><link>http://www.secuobs.com/revue/news/297105.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/297105.shtml</guid></item>
<item><title>RSA Breach - Is authentication at risk </title><description>Secuobs.com : 2011-03-30 12:24:15 -  ISC 2 Blog - Most of you have heard about the breach at RSA, in which SecurID token authentication implementation data was stolen In case you did not heard about it, click in the following link, prior to continue reading http newscnetcom 8301-27080_3-20044775-245html As we, as </description><link>http://www.secuobs.com/revue/news/295073.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/295073.shtml</guid></item>
<item><title>Japan  Commentary and Resources</title><description>Secuobs.com : 2011-03-14 20:45:24 -  ISC 2 Blog - It probably hasn t escaped your notice that there s a lot of malware SEO scamming whenever a major disaster occurs A few days ago I started to put together a list of commentary  some of it my own  and resources relating to the </description><link>http://www.secuobs.com/revue/news/291526.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/291526.shtml</guid></item>
<item><title>Improving on an excellent security awareness text </title><description>Secuobs.com : 2011-03-12 08:56:21 -  ISC 2 Blog - Author Rebecca Herold introduces her book very eloquently   I wrote this book to provide a starting point and an all-in-one resource for information security and privacy education practitioners I incorporated much of the information and knowledge I obtained while working </description><link>http://www.secuobs.com/revue/news/291208.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/291208.shtml</guid></item>
<item><title>Job Analysis Survey Privacy Statement</title><description>Secuobs.com : 2011-03-09 18:38:30 -  ISC 2 Blog - One more clarification on the survey  Any information will be handled pursuant to our privacy policy, unless stated otherwise in the survey We don t share private information with any unaffiliated third party The third parties we do share with are </description><link>http://www.secuobs.com/revue/news/290507.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/290507.shtml</guid></item>
<item><title>Maintaining the  Gold Standard  -- CPEs and the Job Task Analysis Surveys</title><description>Secuobs.com : 2011-03-09 16:10:53 -  ISC 2 Blog - As many of our members now know from recent notifications,  ISC ² is conducting Job Task Analysis  JTA  surveys for the CISSP and SSCP certifications during the month of March Recently, some members have questioned the need to reward members with </description><link>http://www.secuobs.com/revue/news/290452.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/290452.shtml</guid></item>
<item><title>Milking the value from security incidents close to home </title><description>Secuobs.com : 2011-03-08 08:34:06 -  ISC 2 Blog -  T he survey showed  a surprising lack of awareness of security issues among the respondents For instance, just 4pourcents admitted to being fully informed about security breaches within their organizations About 80pourcents of those who said their organizations had suffered </description><link>http://www.secuobs.com/revue/news/290071.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/290071.shtml</guid></item>
<item><title>Recovering a dead hard drive in the freezer</title><description>Secuobs.com : 2011-03-02 06:19:30 -  ISC 2 Blog - I've heard about this technique a few times and, having never tried it myself, I've always been cynical  but by all accounts it looks like I'm wrong The basic idea is to put a failed hard drive in the </description><link>http://www.secuobs.com/revue/news/288743.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/288743.shtml</guid></item>
<item><title>Survey finds security still not embedded tightly into software delivery process</title><description>Secuobs.com : 2011-02-24 20:35:22 -  ISC 2 Blog - As many are aware, in late 2010, consulting firm, Creative Intellect Consulting UK surveyed  ISC ² members along with other software development, IT and information security professionals and software architects from around the world in order to better understand the impact </description><link>http://www.secuobs.com/revue/news/287497.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/287497.shtml</guid></item>
<item><title>Christchurch 63 quake today </title><description>Secuobs.com : 2011-02-22 04:20:44 -  ISC 2 Blog - Yet another powerful earthquake today in Christchurch, the main city in New Zealand s South Island, reminds us once again of the importance of physical security measures to protect essential, valuable and yet fragile information assets  not least our people  Our </description><link>http://www.secuobs.com/revue/news/286763.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/286763.shtml</guid></item>
<item><title>We are living on strange  Cyberwar times </title><description>Secuobs.com : 2011-01-31 21:30:58 -  ISC 2 Blog - In the after-crisis of the Stuxnet worm, Governments around the world are mobilizing to be better prepared against CyberThreats and CyberWar It's becoming clear, more and more that groups pf individuals with a lot of knowledge, time and motivation can </description><link>http://www.secuobs.com/revue/news/281951.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/281951.shtml</guid></item>
<item><title>Inadequate Understanding of FISMA Implementation Should Not Impact the Proposed FedRAMP Framework</title><description>Secuobs.com : 2011-01-29 21:59:38 -  ISC 2 Blog - In a recent article published on NextGov, there was a reference to the comments submitted by the Software   Information Industry Association  SIIA  in response to the public comment release of the Proposed Draft of the FedRAMP requirements In reviewing </description><link>http://www.secuobs.com/revue/news/281667.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/281667.shtml</guid></item>
<item><title>How I Communicate PCI Awareness</title><description>Secuobs.com : 2011-01-28 00:54:14 -  ISC 2 Blog - Question on LinkedIn PCI message board  What challenges members are currently facing in achieving or sustaining levels of Employee Awareness required for PCI DSS and the solutions they are employing Awareness has to be mandatory and it has to be </description><link>http://www.secuobs.com/revue/news/281279.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/281279.shtml</guid></item>
<item><title>Pragmatic ethics</title><description>Secuobs.com : 2011-01-25 00:44:40 -  ISC 2 Blog - Is it ethically acceptable for workers to pinch the odd pencil or Post-It note from work, or is this just the thin end of the wedge that leads to fraud, theft, corruption, Enron and Global Economic Meltdown  It's a tricky </description><link>http://www.secuobs.com/revue/news/280474.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/280474.shtml</guid></item>
<item><title>Raising the  Testing  Standard</title><description>Secuobs.com : 2011-01-24 17:35:31 -  ISC 2 Blog - After well over 20 years involved in some aspect or another of the security industry, several of them supplying services to the anti-malware industry, I can say with some confidence that AV product testing has given me more white hairs </description><link>http://www.secuobs.com/revue/news/280343.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/280343.shtml</guid></item>
<item><title>Digital redaction standard</title><description>Secuobs.com : 2011-01-20 02:03:37 -  ISC 2 Blog - A new ISO27k standard covering digital redaction is in preparation I'm inviting comments on a 'top 10' list of information security risks associated with redacting digital files </description><link>http://www.secuobs.com/revue/news/279482.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/279482.shtml</guid></item>
<item><title>ISF,  ISC 2 and ISACA Release Information Security Principles</title><description>Secuobs.com : 2011-01-08 01:18:07 -  ISC 2 Blog - The Information Security Forum  ISF , together with  ISC ² and ISACA, released last month a set of 12 principles designed to help security practitioners respond more effectively to the changing needs of organizations in today s complex, interconnected world  ISC ² worked with </description><link>http://www.secuobs.com/revue/news/276739.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/276739.shtml</guid></item>
<item><title>Flamer's Bible</title><description>Secuobs.com : 2011-01-07 08:30:24 -  ISC 2 Blog - An old rechumorfunny posting about how to abuse your opponent in a flame war A good guide to remember what  not  to say in any online  discussion  </description><link>http://www.secuobs.com/revue/news/276468.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/276468.shtml</guid></item>
<item><title>Open Source Forensics</title><description>Secuobs.com : 2011-01-06 04:09:35 -  ISC 2 Blog - A reference for the use of open source software in digital investigations, that is digital forensics, computer forensics, and incident response </description><link>http://www.secuobs.com/revue/news/276162.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/276162.shtml</guid></item>
<item><title>Baby stats</title><description>Secuobs.com : 2011-01-06 04:09:35 -  ISC 2 Blog - On the face of it, this has nothing to do with security Dig a bit deeper, though, and it does We rely on risk analysis, sometimes losing track of the dangers in the thickets of data and metrics of which </description><link>http://www.secuobs.com/revue/news/276161.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/276161.shtml</guid></item>
<item><title>Cloud Adoption Will Force Federal Agencies to Adopt Integrated Risk Management Practices</title><description>Secuobs.com : 2010-12-17 22:02:30 -  ISC 2 Blog - The Cloud extends the scope of Risk Management when risk is considered an enterprise  organizational  activity which takes into consideration various aspects of the nature of the cloud adoption The  25-Point Implementation Plan to Reform Federal IT  published by Vivek </description><link>http://www.secuobs.com/revue/news/272715.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/272715.shtml</guid></item>
<item><title>The true meaning of  security awareness training </title><description>Secuobs.com : 2010-12-10 09:57:40 -  ISC 2 Blog - My eye has been caught once again this afternoon by yet another advertisement disguised as a press release breathlessly informing us that the company can deliver  security awareness training  It seems innocuous enough, but what does this three-word phrase really </description><link>http://www.secuobs.com/revue/news/270804.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/270804.shtml</guid></item>
<item><title>Exploring the FedRAMP Cloud Computing Security Requirements Baseline</title><description>Secuobs.com : 2010-12-08 15:39:58 -  ISC 2 Blog - The FedRAMP Security Requirements  describes the US Government s proposed Assessment and Authorization  A A  for US Government Cloud Computing  In chapter 1, the FedRAMP PMO defined the proposed requirements  security controls  for a Low- and Moderate-Impact Cloud Computing environment  although not </description><link>http://www.secuobs.com/revue/news/270225.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/270225.shtml</guid></item>
<item><title>FedRAMP Poised for Summer Release</title><description>Secuobs.com : 2010-12-04 16:02:46 -  ISC 2 Blog - According to articles posted by nexgov  White House set to complete security standards for cloud computing services next year  and ExecutiveGov  Kundra  Expect Formal Federal Cloud Security Standards in 6 Months , through the FedRAMP program, the federal government could seek </description><link>http://www.secuobs.com/revue/news/269368.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/269368.shtml</guid></item>
<item><title>Update on relief for those affected by erroneous exam notifications</title><description>Secuobs.com : 2010-12-02 17:46:33 -  ISC 2 Blog - 2 December, 2010 - 10 30 AM I am pleased to report that we will be, upon candidates  completion of the certification process, waiving Annual Maintenance Fees  AMFs  for one year for those who received inaccurate fail notices in October We </description><link>http://www.secuobs.com/revue/news/268875.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/268875.shtml</guid></item>
<item><title>Unofficial FedRAMP Community Collaboration</title><description>Secuobs.com : 2010-11-30 01:51:42 -  ISC 2 Blog - The FedRAMP comment submission period has recently been extended to January 17, 2011 which was extended twice - originally from December 2, 2010 until December 17, 2010 Additionally, as noted on the FedRAMPgov site, the FedRAMP PMO expects the first </description><link>http://www.secuobs.com/revue/news/268176.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/268176.shtml</guid></item>
</channel>
</rss>
 
