Quantcast
Channel: Information security – IT Governance Blog
Browsing all 175 articles
Browse latest View live

Vigilant Software updates the information security risk assessment tool vsRisk

Vigilant Software has updated its information security risk assessment tool vsRiskTM that is distributed by IT Governance EU. vsRisk 1.7 features various enhancements that permit an even faster and...

View Article



CISMP – the perfect start to an information security career

Looking for a qualification that demonstrates a broad  understanding of information security management? You should consider CISMP – the Certificate in Information Security Management Principles (to...

View Article

The growth of cyber security

The biggest event in the world of UK information security is just coming to an end for another year, at Earl’s Court in London. Infosecurity Europe is an opportunity for the major players in the areas...

View Article

Hacktivists: when the threat from outside and the threat within meet

Earlier this week, Australian police announced they had arrested 24 year old Matthew Flannery (known online as Aush0k) who claimed to be the leader of ‘hacktivist’ group LulzSec. Although the group...

View Article

Free fact sheet demystifies information security qualifications

Don’t know your CISMs from your CRISCs? Our new fact sheet will help you gain some clarity. “Information Security Qualifications – A Fact Sheet” is the latest in a series of new titles in development,...

View Article


InfoSec 2013 & ISO 27001: Your Questions Answered

Following a successful InfoSec Europe 2013 at Earls Court, London, Steve Watkins (Director, Trainer and Consultant at IT Governance Ltd) reflects on the most popular enquiries relating to ISO 27001...

View Article

The Boardroom Cyber Watch Survey Needs Your Opinion

For your chance to win an Amazon Kindle Fire and to receive a free copy of the IT Governance report on company directors and IT Security, then please complete our short survey. It’s multiple-choice and...

View Article

Cyber security professionals shortage in India

Tools to become better at ISO27001 Earlier this month the Times of India reported that India is currently in need of an additional 55,000 certified cyber security professionals by 2015 to protect its...

View Article


HR – the secret information security weapon

The recent ISBS survey commissioned by the Department for Business, Innovation and Skills dished up some eyebrow raising stats on the increasing number of information security breaches. For example...

View Article


Preparation, Preparation and More Preparation – The Key to Passing CISSP

The (ISC)2 CISSP certification is recognised as the premier qualification for a senior career in information security. At first sight, preparing for the CISSP exam seems straightforward although many...

View Article

Psst, it’s PAS 555:2013 – the new standard for cyber security

Yes, that’s right, you heard it here first. The new standard for cyber security from BSI has now been released – PAS 555:2013 Psst, it’s PAS 555:2013 – the new standard for cyber security is a post...

View Article

Data Classification Software – Sparing Legal Blushes

Recently I blogged about Data Classification and even more recently you may have read an email from IT Governance, created by yours truly, about how everyone is responsible for clearly marking the...

View Article

India’s Top 5 Information Security Concerns: 2013

India is rarely out of the news when it comes to IT, especially with the large IT BPO (business process outsourcing) industry, technology investments, information security incidents, new policy,...

View Article


Ever thought of becoming an information security manager?

Let's face it, we all want to progress in our careers, learn new skills and increase our earning potential. If you are an information security professional you'll no doubt want to progress you career...

View Article

It’s classified – How to handle information classification as part of an ISO...

As part of any ISO 27001 project, there is a need to classify information with an appropriate level of classification. It’s classified – How to handle information classification as part of an ISO 27001...

View Article


PRISM: George Orwell Told Us So

In George Orwell’s 1984 surveillance and the collection of data is used to control the citizens of Oceania. In the novel individuals are monitored through telescreens (the equivalent of a 2-way TV) and...

View Article

A career in Information Security: Have you got what it takes?

According to a Eurostat report, unemployment throughout Europe has reached another record high. 19.38 million people were out of work this April, where both Greece and Spain had unemployment rates of...

View Article


The future for Indian cyber security systems

With the leak of America’s covert operation (PRISM), individuals, organisations and governments throughout the world are on tenterhooks as to what this means for them and the repercussions it will...

View Article

Are you considering CRISC – the best professional certification award?

If you have 3+ years experience in risk management and information systems control, it is definitely worth considering adding ISACA’s CRISC certification to your CV. Earlier this year CRISC (Certified...

View Article

The case for implementing ISO 27001 and ISO 20000-1 together, based on ISO 27013

ISO (The International Standards Organisation) and IEC (The International Electrotechnical Commission), have now released ISO/IEC 27013:2013. This standard gives guidance on the integrated...

View Article
Browsing all 175 articles
Browse latest View live




Latest Images