Security experts and practitioners from around the world gathered at the 11th annual SecTor conference in Toronto last week. Among other highlights, there was a lot of focus on the evolution of technology in addressing cybersecurity challenges. In his keynote address, IBM Resilient CTO Bruce Schneier called for increased government regulations in order to improve cybersecurity. If you were side tracked by the industry news coming out of SecTor, there might have been some happenings that flew under your radar. Here’s a look at other interesting headlines to help get you up to speed on different news worthy stories across several aspects of cybersecurity. Partners in fighting cyber crime Mergers and acquisitions aren’t uncommon in the security industry, but ADT
- Nov 20,
If you are a cloud service provider (CSP), much of your credibility will come from your transparency. Clients will constantly worry about your ability to remain secure and reliable in all areas of operations, and they will compare it to what they know best – their own in-house system. Bedside manner and customer experience are vital components of a CSP’s offerings, but they are underused commodities. Cloud Tweaks most recent blog, How Security Certification Helps Cloud Service Providers Stay Transparent and Credible, reveals how partnering up with a Certified Cloud Security Professional (CCSP) can make all the difference in ensuring your customers enjoy both physical security and emotional confidence. Read it now >
Nov 16,If earning a professional certification were easy, everyone would have one. The truth is, making the decision to advance your career is a major undertaking. Planning for the process is the best way to set yourself up for success on the certifications you need to advance your infosec career. In order to manage your expectations, it is important to be realistic about the commitment you’re making. Following these five steps will set you up for success by ensuring that you are choosing the certifications you need based on the skills you currently have and where you want to take your career. Know what you want and what you need. Let’s face it, there are a lot of certification offerings, and
Nov 15,By Kaya Kazmirci, Managing Director, Kazmirci Associates Kaya will be hosting the session Mobile Payment Systems: Disruptive Development and Cyber Risks at (ISC)² Secure Summit MENA, between 21st and 22nd November 2017. Two fundamental shifts in traditional payment methods are changing the landscape of spending. Emerging blockchain-based currencies and alternative payment channels are disrupting time honored cash and credit card-based transaction service providers. Enabling cheap transactions when traditional banking services are expensive is critical for supporting business growth, especially in the developing world, where banking services are not always cheap or available. At the same time, ensuring appropriate privacy, security and confidentiality, as well as the (lack of) disclosure level that customers are demanding, mandates innovation in a very conservative
Nov 14,This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is the sixth installment: Brencil Kaimba, Security Consultant at Serianu Limited (Kenya) Over the past twelve months, Brencil has been mentoring university and high
Nov 13,