• Name: Tiffany TempleTitle: Cyber Security AnalystEmployer: City of GreensboroLocation: Greensboro, North Carolina, U.S.A.Education: Bachelor of Science in Management Information Systems - East Carolina University, Master of Science in Information Technology Management - University of North Carolina at GreensboroYears in IT: 5Years in information security: 4Cybersecurity certifications: SSCP   How did you decide upon a career in cybersecurity? I was encouraged by my current boss to transition from Help Desk duties to an Information Security role after she saw in me the analytical skills necessary to succeed. It was a seamless transition for me and I can honestly say one of the best decisions I have made, as I have been learning new things and enhancing my skill set ever since.

    Oct 23,
  • This year marks the first ever (ISC)² EMEA Information Security Leadership Awards (ISLA), a chance for our community to recognise fellow information security and management professionals going the extra mile to enhance security across Europe, the Middle East and Africa. Overall, we received a staggering number of impressive submissions, over 200, and these were shortlisted down to our finalists by our judges, members of the Europe, Middle East and Africa Advisory Council (EAC). Winners will be announced at our Secure Summit UK on 12 December 2017. In the meantime, we will be sharing their stories on the blog. Here is the second instalment: Peter O’Boyle, Information Security Manager at ICON (Ireland) After graduating from the Dun Laoghaire Institute of Art, Design & Technology

    Oct 21,
  • John McCumber is the newest member of the (ISC)² family. He joined the team last month and will be our first ever director of cybersecurity advocacy. John is based out of our North America Region office in Alexandria, Virginia and will be supporting the (ISC)² membership by advocating for them and the profession across the U.S. and Canada. John got his start in infosec in late 1986, when – in the middle of the night – he received a call that the DEC VAX 11/780 he was responsible for was under attack. Someone had figured out the vulnerability for the computer and it was being targeted by “bulletin board hackers.” John figured out what they were doing and how to

    Oct 17,
  • With news of the WPA2 KRACK (Key Reinstallation Attack) vulnerability ­– a security protocol flaw impacting nearly every Wi-Fi device– spreading quickly across the internet today, security professionals and novices alike are looking for clear guidance on what to do. With headlines like Serious flaw in WPA2 protocol lets attackers intercept passwords and much more and WPA2 security flaw puts almost every Wi-Fi device at risk of hijack, eavesdropping, it’s easy to understand why so many security pros woke up to another huge headache today. We asked our new Director of Cybersecurity Advocacy John McCumber to break down this news for us. Here is how he summed it up: “This weekend, the IT world woke up to the exposure of

    Oct 16,
  • From hacking U.S. intelligence, to blood test results, to your Facebook account. Here are the security headlines for the week of October 9, 2017: A recent study shows that privacy and security is only a concern for 15% of consumers when “performing work-related activities” (as opposed to 75% when visiting a doctor). So many that’s why so many companies are getting hacked? Spy vs Spy: Israeli officers watched in real time as agents in Russia searched for American intelligence information. Are iPhones conditioning us to fall for a phish? One researcher says so. It’s almost Halloween, so let’s call this healthcare data leak a BLOOD HACK. Sure, the title is cheesy, but this scary story is all too real. Cyberattacks

    Oct 13,