• From the continuing NotPetya attack to the most hackable countries in the world, here’s what made the top security headlines for the week of July 3, 2017: The Ukraine is scrambling to contain a new cyber threat after the ‘NotPetya’ attack, according to Reuters. Investigators are saying that the hack may be far more nefarious than previously thought. Looking to protect against a cyberattack? Here are some simple steps from Freight Waves. Threats on the rise – Linux IoT devices. Which countries are the most hackable in the world? Rapid 7’s National Exposure Index ranks the top 10 most hackable countries in the world based on how vulnerable they are to attacks likes DDoS, eavesdropping, etc. Just another vulnerability. An

    Jul 07,
  • Recently, the (ISC)² ThinkTank tackled the cloud. The webinar, “Security Practices for a More Secure Cloud,” featured panelists Kurt Hagerman, CISO of Armor, Raj Goel, CTO of Brainlink, and Keith Young, Info Security Officer of Montgomery County. Thank you to our panelists for sharing their expertise - let’s continue the conversation, shall we?     Since cloud is becoming a hot commodity these days, how can a cloud provider assure would be customers that data is 100% secured day-in-and-day-out? I guess there can never be a guarantee. In line with this, how can a cloud provider show that all measures are done to keep data secure? Kurt Hagerman, CISO, Armor Defense: No cloud provider can guarantee 100% security of your

    Jul 06,
  • Name: Lucy Chaplin (ISC)² Exams Passed: CISSP Title: Manager Employer: Wavestone UK Location: London, UK Education: Bachelor of Science, Economics and Politics Years in information security: 4.5 Certifications: PRINCE2 Registered Practitioner, ITIL V3 What did you want to be when you were a child?A pop star, of course! And I also thought it would be fun to practice law — be a barrister, wear a big white wig and argue in front of a judge. If you were given three more hours per day, what would you do with it?The boring answer is get more sleep. But I would also read a lot more, I tend to save that for holidays. And I would also do more triathlon training, I’m

    Jul 05,
  • If no news is good news, we’ve got trouble. Here are the top security headlines for the week of June 26, 2017: Is your security team down with IoT? Yeah, you know that 48% of U.S. companies aren’t. Just when you thought ransomware was out of the news, Petya pulls you back in. A two-step guide to dealing with ransomware: 1. Back up your data. 2. Never pay. The source code is out there. Windows 10 code was released, causing even more security concerns for the operating system. Snapchat maps? Time to activate Ghost Mode. Heard a cybersecurity story we should share? Tweet us @ISC2!

    Jul 03,
  • By Yves Le Roux, CISSP, CISM, Co-Chair, Europe, Middle East and Africa Advisory Council (EAC) Recently our GDPR Task Force has found that despite efforts to prepare for the incoming regulation, many practitioners are finding that there is actually a lot more to do than originally anticipated, and are still in “discovery mode” about what data they hold. Data being fragmented and contained within individual business units means that knowing where data sets reside and mapping their flow is proving challenging. Businesses have just realised the mammoth task ahead of them Many businesses are still stuck in the initial stages of establishing their inventories of information, or not yet having support from the board and business units of their organisations,

    Jun 29,