Vigilant Software updates the information security risk assessment tool vsRisk
Vigilant Software has updated its information security risk assessment tool vsRiskTM that is distributed by IT Governance EU. vsRisk 1.7 features various enhancements that permit an even faster and...
View ArticleCISMP – the perfect start to an information security career
Looking for a qualification that demonstrates a broad understanding of information security management? You should consider CISMP – the Certificate in Information Security Management Principles (to...
View ArticleThe growth of cyber security
The biggest event in the world of UK information security is just coming to an end for another year, at Earl’s Court in London. Infosecurity Europe is an opportunity for the major players in the areas...
View ArticleHacktivists: when the threat from outside and the threat within meet
Earlier this week, Australian police announced they had arrested 24 year old Matthew Flannery (known online as Aush0k) who claimed to be the leader of ‘hacktivist’ group LulzSec. Although the group...
View ArticleFree fact sheet demystifies information security qualifications
Don’t know your CISMs from your CRISCs? Our new fact sheet will help you gain some clarity. “Information Security Qualifications – A Fact Sheet” is the latest in a series of new titles in development,...
View ArticleInfoSec 2013 & ISO 27001: Your Questions Answered
Following a successful InfoSec Europe 2013 at Earls Court, London, Steve Watkins (Director, Trainer and Consultant at IT Governance Ltd) reflects on the most popular enquiries relating to ISO 27001...
View ArticleThe Boardroom Cyber Watch Survey Needs Your Opinion
For your chance to win an Amazon Kindle Fire and to receive a free copy of the IT Governance report on company directors and IT Security, then please complete our short survey. It’s multiple-choice and...
View ArticleCyber security professionals shortage in India
Tools to become better at ISO27001 Earlier this month the Times of India reported that India is currently in need of an additional 55,000 certified cyber security professionals by 2015 to protect its...
View ArticleHR – the secret information security weapon
The recent ISBS survey commissioned by the Department for Business, Innovation and Skills dished up some eyebrow raising stats on the increasing number of information security breaches. For example...
View ArticlePreparation, Preparation and More Preparation – The Key to Passing CISSP
The (ISC)2 CISSP certification is recognised as the premier qualification for a senior career in information security. At first sight, preparing for the CISSP exam seems straightforward although many...
View ArticlePsst, it’s PAS 555:2013 – the new standard for cyber security
Yes, that’s right, you heard it here first. The new standard for cyber security from BSI has now been released – PAS 555:2013 Psst, it’s PAS 555:2013 – the new standard for cyber security is a post...
View ArticleData Classification Software – Sparing Legal Blushes
Recently I blogged about Data Classification and even more recently you may have read an email from IT Governance, created by yours truly, about how everyone is responsible for clearly marking the...
View ArticleIndia’s Top 5 Information Security Concerns: 2013
India is rarely out of the news when it comes to IT, especially with the large IT BPO (business process outsourcing) industry, technology investments, information security incidents, new policy,...
View ArticleEver thought of becoming an information security manager?
Let's face it, we all want to progress in our careers, learn new skills and increase our earning potential. If you are an information security professional you'll no doubt want to progress you career...
View ArticleIt’s classified – How to handle information classification as part of an ISO...
As part of any ISO 27001 project, there is a need to classify information with an appropriate level of classification. It’s classified – How to handle information classification as part of an ISO 27001...
View ArticlePRISM: George Orwell Told Us So
In George Orwell’s 1984 surveillance and the collection of data is used to control the citizens of Oceania. In the novel individuals are monitored through telescreens (the equivalent of a 2-way TV) and...
View ArticleA career in Information Security: Have you got what it takes?
According to a Eurostat report, unemployment throughout Europe has reached another record high. 19.38 million people were out of work this April, where both Greece and Spain had unemployment rates of...
View ArticleThe future for Indian cyber security systems
With the leak of America’s covert operation (PRISM), individuals, organisations and governments throughout the world are on tenterhooks as to what this means for them and the repercussions it will...
View ArticleAre you considering CRISC – the best professional certification award?
If you have 3+ years experience in risk management and information systems control, it is definitely worth considering adding ISACA’s CRISC certification to your CV. Earlier this year CRISC (Certified...
View ArticleThe case for implementing ISO 27001 and ISO 20000-1 together, based on ISO 27013
ISO (The International Standards Organisation) and IEC (The International Electrotechnical Commission), have now released ISO/IEC 27013:2013. This standard gives guidance on the integrated...
View Article
More Pages to Explore .....