Information and Cybersecurity

Search this Discussion

1 to 50 of 806 threads (2.5K total posts)
Thread Subject Replies Last Post
UN warns cybercrime on rise during pandemic
1 19 hours ago by Gilbert Van Zeijl
Original post by Michel Lambert
Shifts in Underground Markets
1 23 hours ago by Pratik Shah
Original post by Michel Lambert
Security assessment of MS Dynamics based application
4 23 hours ago by Pratik Shah
Behind the firewall: a discussion on the evolution of cybersecurity in the utility industry
0 5 days ago by Michel Lambert
Email Encryption
4 6 days ago by Bob van Graft
Original post by Frederico Ferreira
Telework Successfully During (And After) the COVID-19 Pandemic
1 6 days ago by Marc Vael
Original post by Michel Lambert
Security Awareness Training To Prevent Attacks
6 6 days ago by Marc Vael
Original post by Ayotunde Egunjobi
Dockers Pentest Lab
0 6 days ago by Luis Martinez
Organized crime suspected of being behind COVID-19 phishing and counterfeit-equipment scams
0 6 days ago by Michel Lambert
"Hack-for-hire" firms have been creating Gmail accounts spoofing the WHO
0 6 days ago by Michel Lambert
The Challenge of That First Job in Cybersecurity - Entry Level Roles and How to Qualify 0 7 days ago by Deborah Kariuki
Software to securely erase hard drives
6 9 days ago by Frederico Ferreira
ISMS implementation
9 9 days ago by Pratik Shah
Original post by Muhammad Khan
Expiration date on a MS documents
2 9 days ago by Pratik Shah
Original post by Gilberto Fernandez
Chinese legislation, regulations and other standards
2 10 days ago by Francisco Brito
Risk related to SSO settings
4 13 days ago by Zineb Gridda
US DoD just released it's new Cybersecurity Maturity Model Certification
5 13 days ago by Shing Ying Kah
Original post by Michel Lambert
SOC 2 vs PCI
3 13 days ago by James Arnold
Original post by Richard Flowers
Does risk quantification add value to your business decisions?
5 13 days ago by Stephen Owen
Original post by Sudhakar Sathiyamurthy
Risk Management and Cybersecurity
11 15 days ago by Courage Mucheche
Original post by Yaxin Peng
Any ISACA Cert similar to CISSP?
9 16 days ago by James Scardelis
Original post by Eric Keller
Need audit scripts for NIST 800-53 r4 controls
1 16 days ago by Jeffery Pershing
Original post by Shridhar Kuppannagari
Subprocessor list on webpage
2 18 days ago by Sebastian Burgemejster
DHS and FBI share list of top 10 most exploited vulnerabilities
0 18 days ago by Michel Lambert
Woman stalked by sandwich server via her COVID-19 contact tracing info
1 19 days ago by Frederico Ferreira
Original post by Michel Lambert
IT General Controls
5 20 days ago by Manoj Agarwal
Original post by Douglas Mapuranga
GDPR law enforcement
0 20 days ago by Marcelo Muzilli
ACTUAL DIFFERENCES BETWEEN INFORMATION LEAKAGE AND DATA BREACH
6 20 days ago by Adeniji Adesemowo
Original post by Gian Franco Cappello
Effective Encryption Key Management With Remote Workers
0 21 days ago by Aaron Faby
Artificial Intelligence vs Audit and Information Security in a COVID 19 WORLD
2 21 days ago by Lorraine Cameron
More Men than Women Fall Victim to Cybercrime
0 23 days ago by Michel Lambert
How to Open a Secure Email in Outlook and Gmail.
2 23 days ago by Frederico Ferreira
Original post by Ben Kurtman
WEB app security testing for WFH tools
1 23 days ago by Bonface Asiligwa
Original post by Sneha Joshi
Academics turn PC power units into speakers to leak secrets from air-gapped systems
1 27 days ago by Marc Vael
Original post by Michel Lambert
AWS and Azure Cloud Security Controls
4 28 days ago by Shridhar Kuppannagari
SOC Audit Program
3 28 days ago by Bob van Graft
Original post by Dustin Ketterling
Cyberattacks: Who was targeted in Q1-2020?
2 28 days ago by Bob van Graft
Original post by Michel Lambert
Coronavirus Cybercrime Increasing during Pandemic
2 28 days ago by John Giordani
Original post by Ben Kurtman
NIST Publishes SP 800-57 Part 1, Revision 5, "Recommendation for Key Management: Part 1 – General"
0 29 days ago by Michel Lambert
Development of IT Risk Register
3 29 days ago by Desmond Adusei
New DFIR Advanced Smartphone Forensics Poster is out now!
1 29 days ago by Marc Vael
Original post by Michel Lambert
Vendor Due Diligence Questionnaire In the Wild
1 29 days ago by Marc Vael
Original post by Charles Dunn
Dark web criminals peddle fake Covid-19 vaccines as a front for malware attacks
1 29 days ago by Marc Vael
Original post by Michel Lambert
IT Risks - COVID19
6 one month ago by Lionel Jayasinghe
Original post by Ahmad AlZubi
How IT Risk Management will change in the post-pandemic world?
0 one month ago by Sudhakar Sathiyamurthy
ISACA Survey: Cybersecurity Attacks Are Rising During COVID-19, But Only Half of Organizations Say Their Security Teams Are Prepared for Them
0 one month ago by Michel Lambert
Interactive mock audit scripts
1 one month ago by Kenneth Kelley
Original post by Marcus Saint Jean
TLS1.0 compensating controls
3 one month ago by James Arnold
Original post by Monica Makau
Telehealth: What's at stake from a security standpoint?
1 one month ago by Kenneth Kelley
Original post by Michel Lambert
Covid & SME
2 one month ago by Kenneth Kelley
Original post by Sven De Preter