Sort
Website of Information Systems Security Association (ISSA) International, the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure. Through involvement with your chapter and access to ISSA International resources, you can turn that value statement into a roadmap...
Rank
1
Vote
Sponsor
0.0
With expertise and the collective knowledge of our members - the ISF delivers practical guidance to overcome wide-ranging security challenges. Our research, practical tools and guidance address current topics and are used by our Members to overcome the wide-ranging security challenges that impact their business today. This site uses cookies. By continuing to browse the site you are agreeing to...
Rank
2
Vote
Sponsor
0.0
The latest In-depth product reviews, buyerâ s guides, product comparisons, news, market analysis, whitepapers, and other information on IT security. A thorough security audit can be an eye opener for any organization. Does yours need one? Take a look at our whitepapers, features and tools to find...
Rank
3
Vote
Sponsor
0.0
New research from mobile security and management expert Wandera has found that the official UEFA Euro 2016 Fan Guide App is leaking users’ personal data. Analysis of the data traffic patterns from enterprise mobile devices reveals that highly personal user credentials, including usernames,...
Rank
4
Vote
Sponsor
0.0
Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard...
Rank
5
Vote
Sponsor
0.0
The directory of information security policies and computer security policy resources. The relationship between information security policies and risk analysis is by their very nature complex. Both are essential pre-requisites to sound information security, but in some organizations they tend to sit uneasily together. This need not and should not be the case. As described above, information...
Rank
6
Vote
Sponsor
0.0
GovInfoSecurity.com covers the latest news, laws, regulations and directives related to government information security, focusing on the White House's cybersecurity initiatives, the latest legislative efforts in Congress, as well as thought leadership from top government CISOs. Bangladesh Bank has opted to not extend a contract with the incident response team that it hired to investigate the...
Rank
7
Vote
Sponsor
0.0
Interested in becoming a Resiliency Practitioner? Our Certified Enterprise Resiliency Practioner (CERP) Certificate Program provides meaningful training with a certification for any employee in an organization. Learn more. The CSO Xchange is a group of thought leaders and executive-level peers who have a passion for security, risk management or compliance and the responsibility to protect their...
Rank
8
Vote
Sponsor
0.0
GIAC is the leader in information security certifications, cyber security, IT security, forensics & penetration testing certifications. Global Information Assurance Certification (GIAC) is the leading provider and developer of Cyber Security Certifications. GIAC tests and validates the ability of practitioners in information security, forensics, and software security. GIAC certification holders...
Rank
9
Vote
Sponsor
0.0
Torrid Networks is a leading cyber security company providing its expert consulting services to over 500+ brands in India, UAE and across the globe. Torrid Networks is a specialized information security management and consulting company. With renowned and well-regarded cyber security leaders aboard, company is globally recognized for its cutting-edge services and excellence in the domain of...
Rank
10
Vote
Sponsor
0.0
Do you, like many people, have a personal computer? Have you ever wished to take it with you and have that type of power when you are on the go? That is the beauty of notebook computer. They provide w... The Heartbleed Bug has been receiving a good amount of press over the last few days. That is because the bug has been interfering with dozens of some of the most high profile websites out...
Rank
11
Vote
Sponsor
0.0
Computer based information security awareness training courses. Buy on-line security awareness training modules, contents, films, presentations and posters. In order for the organization's security program to operate effectively, all employees must help the organization to secure its assets. Security Awareness provides the greatest return on investment, and has the greatest positive impact on a...
Rank
12
Vote
Sponsor
0.0
To be considered a respected Information Security Professional nowadays requires more than just knowing the bits or bytes, or the controls required by a given framework by heart. Being successful in your Information Security career requires you to have a deep understanding of the business needs (and how to enable, not disrupt them), sharp communication […]. In one of our previous article we...
Rank
13
Vote
Sponsor
0.0
BankInfoSecurity.com is your source for banking information security related content, including fraud, ID theft, risk management, emerging technology (authentication, cloud computing, mobile banking, social media), as well as the latest regulations and anlysis on current topics. So why is Visa temporarily reducing the fraud chargeback burden on non-EMV-compliant U.S. merchants? Mark Nelsen,...
Rank
14
Vote
Sponsor
0.0
InfoSecurity Ireland is an industry-led organisation, facilitating collaboration, marketing and research for the Irish information security sector. Infosecurity Ireland (ISI) supports the interaction of technology firms, research institutes, third level colleges and industry associations to ensure continuous development of Ireland as a centre of excellence in information security. ISI also...
Rank
15
Vote
Sponsor
0.0
Providing high-quality, industry leading Information Security Policy & Procedures Documentation for immediate download. Essential documentation for putting in place highly critical policies and procedures for compliance. Immediately Download the Comprehensive Information Security Policy and Procedures Manual Today! Don't waste precious man-hours, use our industry leading information security...
Rank
16
Vote
Sponsor
0.0