By Dr. Lyron Andrews, CISSP, SSCP and CCSP The vast majority of organizations today have migrated to the cloud to take advantage of rapid deployment, scalability and user empowerment. Eighty nine percent of respondents to a 2019 survey by DivvyCloud have adopted the public cloud. But many don’t know how the cloud works, the best use cases, potential risks, or the tools available to help optimize their security posture. And even as organizations struggle to understand cloud basics, new industry concepts and technologies, such as zero trust, micro segmentation, containerization and microservices, continue to emerge. By pursuing Certified Cloud Security Professional (CCSP) certification, cybersecurity experts within the organizations can gain a holistic understanding of cloud architecture, infrastructure, deployment models, emerging
- Apr 09,
By Tony Vizza, CISSP, CCSP, Director for Cyber Security Advocacy - APAC at (ISC)² “Tony, why did you get into cyber security?,” I am often asked. Truth be told, I had an interest in IT from a very young age. In second grade, my classroom had an early model Apple which the teacher did not know how to use and which I taught her. In high school, I took computer studies as a subject. Following this, I enrolled and completed an undergraduate degree in computer science. My first job after graduation was as a programmer and network administrator within a large multinational travel agency. Later on, I worked in IT infrastructure design and architecture and even did a stint in
Apr 08,(ISC)2 offers comprehensive certification exam prep for every type of learner. Whether you’re studying for the CISSP, CCSP, SSCP or another industry leading (ISC)2 certification, we have exam prep solutions to help you prepare with confidence. Many successful candidates move forward with Official (ISC)2 Online Instructor-Led Training, believing it delivers the best of both worlds – live expert instruction and online convenience for complete flexibility. And now this popular training is being offered at a new lower price. Perfect for distance learning, this hands-on training format offers the structure of real-time class in a virtual setting, with the option to access course recording. As you develop your personal study plan, consider the advantages of (ISC)2 Online Instructor-Led Training. As long
Apr 07,The number of people working from home is skyrocketing as the COVID-19 pandemic forces companies to close offices and practice social distancing. The sudden explosion of makeshift home office environments is adding to the burden of already overtaxed cybersecurity workers, who now face the massive task of trying to protect a remote workforce against cyber threats. While cybersecurity professionals put in extra hours to handle the situation, the increasing ranks of remote workers are catching the attention of another group – cyber attackers. Cyber criminals are betting that many of these hastily outfitted work-from-home environments will not have the same level of protection as office environments, while still connecting to their corresponding corporate networks. For cybercriminals, that spells opportunity. And
Apr 06,Earlier this week, (ISC)2 announced that nominations are now being accepted for the 2020 (ISC)2 Global Achievement Awards. This awards program replaces the former (ISC)2 Awards Program, which had included the Information Security Leadership Awards (ISLA). The new program creates a unified, global platform for recognition of the most outstanding annual achievements in the field of cybersecurity. For years, (ISC)2 has honored and celebrated deserving cybersecurity professionals from around the world with its awards program, highlighting best practices and those who have gone above and beyond to inspire a safe and secure cyber world. The four categories now open for nominations within the (ISC)² Global Achievement Awards program are outlined below. Up to one winner from each region (Asia-Pacific, North
Apr 03,