CISSP certification: Hacktivism and state sponsored hacking.

Types of attackers: Hacktivism/Hacktivist (hacker activist): Hacking for political or socially motivated purposes. Often aimed at ensuring free speech, human rights, freedom of information movement. Famous attacks: Anonymous – DDOS…

Continue ReadingCISSP certification: Hacktivism and state sponsored hacking.

IT Security from The Guardian “Deloitte hit by cyber-attack revealing clients’ secret emails”

Deloitte hit by cyber-attack revealing clients’ secret emails Exclusive: hackers may have accessed usernames, passwords and personal details of top accountancy firm’s blue-chip clients. The Guardian understands Deloitte discovered the…

Continue ReadingIT Security from The Guardian “Deloitte hit by cyber-attack revealing clients’ secret emails”

CISSP certification – from (ISC)² “What Does 125,000 (ISC)² Members Mean to You?”

What Does 125,000 (ISC)² Members Mean to You? (ISC)² is proud to announce that our membership has surpassed 125,000 certified cybersecurity professionals globally. As demand for skilled security professionals continues…

Continue ReadingCISSP certification – from (ISC)² “What Does 125,000 (ISC)² Members Mean to You?”

IT Security from ZDNet “​Australian government pledges AU$50m for cybersecurity research centre”

​Australian government pledges AU$50m for cybersecurity research centre | ZDNet The seven-year investment will see the launch of a cybersecurity cooperative research centre to deliver solutions that increase the security…

Continue ReadingIT Security from ZDNet “​Australian government pledges AU$50m for cybersecurity research centre”

IT Securityom (ISC)²Are “Women the Answer to the Cybersecurity Skills Gap?”

Are Women the Answer to the Cybersecurity Skills Gap? Information security is one of the most important and fastest growing professions in the world, possessing a near-zero unemployment rate, but…

Continue ReadingIT Securityom (ISC)²Are “Women the Answer to the Cybersecurity Skills Gap?”

IT Security – from Yahoo news “Ex-Homeland Security Chief: Good cyber security is like an immune system”

Ex-Homeland Security Chief: Good cyber security is like an immune system A rash of recent high-profile cyber attacks has security experts scrambling to find solutions. “You cannot have an unrealistic…

Continue ReadingIT Security – from Yahoo news “Ex-Homeland Security Chief: Good cyber security is like an immune system”

IT Security – from gizmodo.com “Passwords to Over a Half Million Car Tracking Devices Leaked Online”

Passwords to Over a Half Million Car Tracking Devices Leaked Online We’ve seen a lot of data breaches this year: some big, some small, some that are dangerous, and some…

Continue ReadingIT Security – from gizmodo.com “Passwords to Over a Half Million Car Tracking Devices Leaked Online”

CISSP certification: Thor Pedersen’s answer to “What is the best method to study for the CISSP?” – Quora

When I did mine I watched videos, read book, re-watched videos and took a full practice test (250 questions), then when I knew my weak areas I read the book…

Continue ReadingCISSP certification: Thor Pedersen’s answer to “What is the best method to study for the CISSP?” – Quora