• Container deployments are on the rise and expected to increase over the next 12 months. At the same time, container security incidents are rising exponentially. What types of security challenges are causing these events and, in turn, forcing organizations to delay application deployment?   Before answering, we need to understand why security challenges are currently emerging. Containers have been around since the early 2000s, yet developers didn’t begin using them until recently. Subsequently, organizations are only now beginning to realize their potential – and four areas that make container security uniquely tricky. Read the full article.  

    Aug 18,
  • The nature of organizations is to evolve and adapt to changes and the risks associated with these changes. Businesses migrate to the cloud deploying a multitude of platforms, move their data in the cloud, and employ containerized services not only to survive change but to thrive in this challenging environment. Even though all these technological advancements benefit businesses in many ways, they equally create new risks.     The cybersecurity landscape is evolving together with the technological one. Cybersecurity risks have “escaped” from the siloed environment of IT departments and have become business risks. This is where the role of a Certified Authorization Professional (CAP) becomes incredibly important. Its role is to lead and navigate the business through troubled waters to the

    Aug 17,
  • The duties of the CEO of a member association like (ISC)² are many, and part of the job is to be a strong voice for the membership in advocating for the cybersecurity profession. Clar Rosso took on that responsibility when she was appointed in October 2020. Ever since, she’s been representing the more than 160,000 current cybersecurity practitioners who have earned (ISC)² membership. In addition to meeting with members and presenting to global (ISC)² Chapters, speaking on panels and attending online conferences, Clar has also conducted dozens of press interviews to bring more visibility to the profession and has hosted webinar events that explore some of the most pertinent topics for practitioners regarding workforce recruitment and retention and diversity. Following are

    Aug 11,
  • Chief Information Security Officer (CISO) Luis Gonsalves, Head of Security for Portugal’s central bank, and founder of the Cloud Security Alliance’s Portugal Chapter, says Certified Cloud Security Professional (CCSP) stands out from other technical certifications. With CCSP, cybersecurity experts gain a strategic understanding of cloud governance, risk and data privacy. In turn, they’re able to clearly communicate the advantages and risks of the cloud model to the C-suite. “That’s the real differentiator,” he says. Read the Full Article.

    Aug 11,
  • The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. This is so because of all the doors that certification opens to a CISSP professional. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted. In this installment, we talk to Adesoji Ogunjobi, who is passionate about cybersecurity in Africa. He is Chief Information Technology (security) Architect and Trainer with Kavod Doyen Consulting in Lagos and talks about how this industry has changed over his 14-year professional background and his ambitions for the future.   What job do you do today? I work as an Information Technology Security Consultant and Trainer. What

    Aug 10,