• CISSP trends strong with BrightTALK webinar viewers. BrightTALK, our primary webinar platform, identifies the most popular and trending topics out of more than 100,000 security and technology talks. We recently noticed that cybersecurity is holding strong and ranked number one in the most popular category, but we were excited to see that CISSP was ranked number two in the trending category, outranking a wide array of popular interests. During the year when a pandemic halted travel and training budgets, many people turned to webinars to help sustain their professional development goals. (ISC)² Think Tank webinars and Security Briefings experienced a record 67% year-over-year increase in views with more than 690,000 total views. We awarded more than 396,000 continuing professional education

    Mar 04,
  • Disaster recovery is now a normal part of business operations. However, before the year 2000, disaster recovery was a “nice to have” addition to a business. Then, the “Y2K” bug became the impetus that brought disaster recovery to the forefront of business preparedness. Next, in 2001, the rise of terrorism brought new attention to the need for businesses to prepare for disasters. As time progressed, incidents such as the blackout of 2003 that shut down the northeastern United States for a day, made many recognize that disaster recovery centers could not be on the same power grid, let alone at the same geographic location. Reflecting on those times, it is interesting that the biggest threats to businesses from a cybersecurity

    Mar 03,
  • By Rema Deo, HCISPP By now, everyone is familiar with the Internet of Things (IoT), an expanding network of physical devices, appliances, and equipment that are embedded with sensors, software, and other technologies in order to connect and exchange data with other devices and systems over the Internet. It’s an exciting digital world in which your smartphone can control the tiny computers in your air conditioning system and your house lights. Where the small computer in your refrigerator monitors water quality and automatically orders a new filter from the manufacturer. Where your computerized oven can be turned on remotely to preheat while you drive home. Medical Devices Interconnected The Internet of Things is a reality in the healthcare industry as

    Mar 01,
  • The (ISC)² CISSP and CCSP certifications have recently racked up more recognition from global staffing firm Robert Half. The company’s 2021 Technology Salary Guide looked at the trends and skills impacting technology professionals, as well as the most in-demand IT certifications today. The (ISC)² programs were two of the top 15 in demand certifications highlighted in a CRN story on the topic. Why Are CISSP and CCSP So In Demand? The COVID-19 pandemic shined an even brighter spotlight on the global cybersecurity workforce shortage. While the industry is making strides to fill the talent gap, the pandemic placed greater emphasis on the need for skilled technology professionals to support critical operations and strategic initiatives, as well as understand the cloud.

    Feb 26,
  • By Qamar Peer Bellary Sadiq, CISSP, CCSP Public Key Infrastructure is the most commonly used technology in security space for the purpose of establishing Authentication, Data Integrity, Non-Repudiation, email encryption, SSL/TLS with X.509 Certificates (also known as Digital Certificate). Digital Certificate is a form of a digital identity document in the digital world and helps identify users, entities and servers. PKI is an amalgamation of a suite of protocols, people, processes and technologies that must work in a synchronized manner to create, store, distribute, manage and revoke digital identities. However, there exists real world challenges, pitfalls and misconceptions around Certificate Status validation in the PKI technology space that need to be highlighted.   Misconceptions about Certificate Revocation Revocation of digital

    Feb 25,