Opinion
July 2023
Defending At Machine-Speed With AI-Based Security
Daksha Bhasker, CISSP | 7th July 2023
With the specter of artificial intelligence impacting jobs looming everywhere, consider the opinion that in security and in life, it’s not about what technology can do but it’s about what humans can do when they are empowered by technology.
Educational Institutions: How to Mitigate Cybersecurity Threats
Kalpa Kalhara Sampath, CC | 5th July 2023
As an educational institution, ensuring the safety and security of our students, faculty and staff is our utmost priority. In today's ever-changing world, it is crucial that we take proactive measures to mitigate potential threats.
June 2023
The Cyber Sector’s DEI Efforts Still Routinely Overlook One Important and Valuable Group: The Disabled
Sal Portaro, CSSLP | 30th June 2023
Shifting mindsets and amending programs and strategies to ensure DEI initiatives remain broad and inclusive is not a difficult undertaking. But it needs thought and understanding.
Quantum-Leaping Quantum Computers? Not So Fast!
Daksha Bhasker, CISSP | 30th June 2023
Despite substantial industry concerns about the growth and progress of Quantum Computing, a Quantum Computer capable of breaking cryptosystems might be three to five decades away, claimed one panel at a recent conference.
From Silo to Synergy Between Cybersecurity and Privacy in Europe
John E. Dunn | 2nd June 2023
IAPP and (ISC)² recently collaborated on a pair of webinars, bringing a panel together to shine a light on the intersection of cybersecurity and privacy. After looking at the landscape in the U.S., we now turn our attention to Europe.
May 2023
From Silo to Synergy Between Cybersecurity and Privacy in The U.S.
John E. Dunn | 31st May 2023
IAPP and (ISC)² recently collaborated on a pair of webinars, bringing a panel together to shine a light on the intersection of cybersecurity and privacy. In this first part, the discussion focused on matters and how they impact the U.S.
Target Cybersecurity Chief Says Zero-Ing in On Threat Is Central to Cyber Risk Excellence
Joe Fay | 17th May 2023
At the recent (ISC)² Governance Risk and Compliance event, the cybersecurity head of U.S. retailer Target put threats, risk management and third-party relationships under the spotlight.
Beyond Username and Password: Protecting Your Digital Identity
Elango Balusamy, CC | 4th May 2023
In today's digital age, we use a multitude of digital products and services, one thing common across them is how we identify ourselves in the digital world.
Password Myths vs. Reality
Er. Tapan Jatakia, CC | 3rd May 2023
The widespread use of passwords has also led to numerous misconceptions and myths that can put our security at risk.
April 2023
Swiss Cheese Security Incidents
Dave Cartwright, CISSP | 19th April 2023
For all the cybersecurity planning and mitigation that takes place, we keep experiencing cybersecurity incidents that are formed of a collection of coincidental mistakes that collide to cause an incident that remains unique.
March 2023
Voices Of Women in Cyber - (ISC)² Candidate Nidhi
Nidhi Kannoujia, (ISC)² Candidate | 8th March 2023
Moving from product management to cybersecurity and studying for her CISSP, Nidhi Kannoujia shares some of her experiences and advice for other women considering a career change into a cybersecurity role.
February 2023
The LastPass Breach: Are Online Password Managers Still Safe?
John E. Dunn | 7th February 2023
Should businesses trust online password managers? The problem is that customers can’t easily judge the security of these platforms from the outside.
Should You Have a “No Blame” Culture?
Dave Cartwright, CISSP | 6th February 2023
Who should be to blame when something goes wrong? What about if we forget about blame altogether – it is a healthier and more practical approach to abandon blame assignment and just work the problem?