• A new report by the higher education technology association EDUCAUSE imagines four possible future scenarios of cybersecurity trends in colleges and universities. The report takes into account technology, environmental, economic and political trends to develop the scenarios, while also acknowledging evolving cybersecurity practices and data governance and privacy trends. The goal of EDUCAUSE’s “Horizon Report” is to provide information and analysis to help higher education institutions “learn, plan, and act on all that is influencing higher education information security, now and in the future.” At the same time, the report acknowledges that planning for the future is an inexact science. “If we’ve learned one thing from 2020, it's that the future is more a set of possibilities than it is

    Feb 24,
  • Nominations are now open for the (ISC)² Global Achievement Awards. These awards recognize individuals whose excellence, leadership and volunteer efforts have significantly advanced the cybersecurity industry and contributed to the vision of inspiring a safe and secure cyber world. Most awards are open to both (ISC)² members and non-members, though self-nomination is not permitted. Individual awards for cybersecurity professionals throughout their career include: (ISC)² Government Professional Award (ISC)² Rising Star Professional Award (ISC)² Mid-Career Award (ISC)² Senior Professional Award Additionally, the following awards which were previously selected exclusively by the (ISC)² Board of Directors are now open to nominations from a wider range of nominators, details of which can be found on each award’s page:  (ISC)² Harold F. Tipton Lifetime Achievement Award (ISC)² James R. Wade Service

    Feb 23,
  • The New Face of Healthcare Healthcare is currently undergoing a digital transformation that rivals the development of autonomous vehicles in the automobile industry. In fact, there are connections between improved healthcare and autonomous vehicle development. Digital transformation is a buzzword that evokes many grand ideas. In healthcare, one article succinctly articulated it: “Digital transformation in healthcare is the positive impact of technology in healthcare”. Some of the positive outcomes of digital transformation in healthcare include the rise of telemedicine, the development of internet-enabled medical devices, and medical practice and education via virtual reality technology. These developments are enhanced by the emergence of 5G technologies, bringing real-time care into sharp focus. This is an extraordinary convergence of technologies. With these intertwined

    Feb 22,
  • By Mike Privette, CISSP A question I often get asked is, "How do I advance my career in the cybersecurity field?" tl;dr: Figure out for yourself what "advancement" means (i.e., more money, better title, more challenging problems to solve, etc.) Market yourself and ask others for help to achieve what you want Build a brand an audience around #1 and #2 About Me I've spent more than 15 years operating in, building, and leading cybersecurity programs at several Fortune 500 companies in the Financial Services industry. I'm also the Founder & Managing Principal of Fraction Consulting, where I get to do fractional CTO and CISO work and advise private capital firms. As a result of my background, I often get

    Feb 16,
  • By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP John Martin, CISSP-ISSAP, CISM Richard Nealon, CISSP-ISSMP, SSCP, SCF In part one of this blog series, we discussed privacy, remote access (aka Work from Home), insider threats, data leakage, Zero Trust Architecture (ZTA) and security architecture. To continue this discussion, we believe that 2021 will still see folks working from home; thus, the risks due to insider threats and data leakage will continue to grow. However, we believe that there are other concerns for information security professionals, including edge computing, 5G, IoMT/IoT, AI and ransomware.   Edge Computing Edge Computing is a distributed computing framework that brings enterprise applications closer to data sources such as IoT devices or local edge servers. This proximity

    Feb 12,