Blog

Latest News & Tips

  • With RSA Conference in San Francisco fast approaching, SC Media has once again announced the finalists for its annual awards program. Winners will be announced at the SC Awards dinner and presentation on February 25 at the Intercontinental San Francisco. We’re proud to say that the CISSP has once again been recognized as one of the industry’s Best Professional Certification Programs for 2020 after receiving a Finalist designation in that category. The CISSP was also the winner at last year’s ceremony. The SC Awards are recognized throughout the cybersecurity industry as the crowning achievement for IT security, and winners are run through a rigorous judging process that includes testimonials, industry assessments and additional research. The CISSP was hand-picked as a

  • Last week, IBM’s Security Intelligence blog reported on the highly-discussed cybersecurity skills shortage – and in particular, how some areas are lacking in talent more than others. “Software development is one of the areas most starved of security attention,” wrote Irene Michlin. If you’ve set your sights on specializing in software development cybersecurity, the CSSLP certification is for you. Based on the results of the job task analysis conducted in 2019, the exam will be changing in several ways when it is published later this year. The number of items and the time allowed for the exam will be reduced (from 175 in four hours to 125 in three hours) without compromising the validity of the exam. There will also

  • Why are goal-oriented individuals more likely to thrive professionally? Because they know where they want to go. But accomplishing anything meaningful takes drive and dedication. Most of all, it requires a clearly defined plan and inspiration to stay on track. A milestone like achieving (ISC)2 certification is a powerful motivator, especially when you consider the rewards that come with it. Was 2019 the year you wanted to earn an (ISC)2 credential to enter a high-demand field, enhance your cybersecurity skills or increase job security? Perhaps you even started preparing, but got sidetracked by life’s demands. We really do get it… taking on (ISC)2 certification is a BIG commitment. But ask yourself: If not now, when? Chances are there will never

  • As use of the internet becomes more acceptable in schools and expected at younger ages, cyber safety education is a necessity. While tablets, computers and smart devices are the norm at home and school for children, many students are not taught about the potential dangers faced while using technology. Shockingly, 40% of students in fourth through eighth grades have chatted with a stranger online, of those, 53% gave out their phone number to the stranger and 11% met with a stranger according to Children’s Internet Usage Study. Statistics like these are the impetus behind the mission of the Center for Cyber Safety and Education and its city-wide educational event “Cyber Safety Day.” This one-day event, created by the nonprofit, educates

  • As demand for cloud computing grows, so does the need to secure it. In a survey of its Technology Executive Council members, CNBC found that cloud and software-defined security are among the C-suite’s top technology strategies for 2020. As reported in this video, cloud computing tops the list, and it’s followed by machine learning, artificial intelligence and software-defined security. The CNBC Technology Executive Council has nearly 150 executives in various industries, 70% of whom participated in the survey. The survey shows that securing cloud environments is a major priority – not only for the C-suite but also for cybersecurity workers. Another study, by the SANS Institute, provides further proof. "The SANS survey showed that rapid movement of corporate services and

  • By Dr. Thomas P. Scanlon, CISSP Software Engineering Institute, Carnegie Mellon University Today’s software developers are as much integrators as they are pure coders. There is an abundance of libraries, plug-ins and other third-party software components readily available to speed development. There is no sense in reinventing something when you can just download it, merge it in and move along. Using free and open source software (FOSS) components can save both time and money, so they make for attractive choices. However, including open source software into development projects often makes the cybersecurity professionals in an organization a little uneasy. But, should it? There is often a misconception that FOSS components are ‘less secure’ than commercial products. The reality is that