The use and processing of decentralized data stored in cloud platforms creates security challenges that require data protection strategies to evolve. That starts with achieving better visibility into what applications their employees are using, and how they are using them. User Activity Monitoring (UAM) solutions promise to identify and stop abnormal or anomalous user behavior, whether unintentional or malicious. As opposed to traditional indicators of compromise, indications of abuse help organizations to effectively detect, prioritize, and respond to areas of concern well before a data breach has occurred. Certified cloud security professionals can help their organizations establish and enforce visibility and governance across their cloud deployments by implementing best practices such as the principle of least privilege, robust user authentication
Blog
Latest News & Tips
The Regional (ISC)² Chapter Recognition Awards are presented to an official chapter of (ISC)² within a specific region that best promotes the vision of (ISC)² by inspiring a safe and secure cyber world. The following chapters have demonstrated a well-rounded offering of activities and services designed to benefit its members and affiliates, while making a significant contribution to the profession and local community through the core focus areas of the (ISC)² Chapter Program of Connect, Educate, Inspire and Secure. Join us in celebrating the regional winners at the (ISC)² Global Achievement Awards during (ISC)² Security Congress. Asia-Pacific: Singapore Chapter The Singapore Chapter continues to gain notoriety by developing partnerships with local schools and organizations to conduct career talks and inspiring
It’s October! And that can mean only one thing. It’s time to kick off the annual Cybersecurity Awareness Month, hosted by the National Cyber Security Alliance (NCSA) and the Cybersecurity & Infrastructure Security Agency (CISA). With remote work the new normal for most and ransomware attacks at peak fever pitch, there’s no time like now to learn about cybersecurity, or for those in the know, for a refresher on some of the common pitfalls to avoid in order to keep your data safe. In celebration of this month of best practices discovery, (ISC)² created a one-stop-shop to find helpful cybersecurity knowledge and tips. Throughout October we’ll be adding more links to new blog posts and research as they become available, so check
The U.S. House of Representatives was scheduled to vote on the $1.2 trillion bipartisan infrastructure bill (H.R. 3684) on September 30, but the vote has been delayed for an undetermined length of time. With roughly $1.9 billion allocated to bolstering critical infrastructure security, helping vulnerable organizations defend themselves, and providing funding for a crucial federal cyber office, key budget items hang in the balance, threatening critical infrastructure security among other priorities. (ISC)² conducted an online poll of 226 cybersecurity practitioners—nearly half of which work for an organization responsible for securing critical infrastructure data—to gauge their reaction to the infrastructure bill, how they believe spending should be prioritized and whether they believe state and local authorities have the expertise to make
A new study from HP Wolf Security reveals that cybersecurity teams are meeting a lot of resistance as organizations adjust to a hybrid work model. The hybrid model blends work-from-home (WFH) with in-office policies, requiring cybersecurity teams to implement security measures for both. But their efforts aren’t always appreciated. Resistance to security measures is especially strong in the 18-24 age group, which appears to prioritize efficiency over security. Nearly half (48%) of respondents in the study, titled Rejections & Rebellions, said security policies are a hindrance and waste time. More than half (54%) are more worried about deadlines than potential exposure to security breaches, and 39% weren’t even sure what their companies’ security policies cover. The survey also found that
The U.S. House of Representatives is scheduled to vote on a $1 trillion bipartisan infrastructure bill on September 30, 2021. Back in August, the U.S. Senate passed the bill, which included $1.9 billion for cybersecurity initiatives. According to The Hill, the funds will go toward securing critical infrastructure against attacks, helping vulnerable organizations defend themselves and providing funding for a key federal cyber office, among other initiatives. The House is now set to vote on the bill, and if passed, it will go to the President for his signature. But what exactly are the cybersecurity provisions within the Infrastructure Investment and Jobs Act (H.R. 3684)? The (ISC)² Advocacy Team did some digging and pulled together the following comprehensive list of cybersecurity