SFIA Foundation maps ISACA certifications to IT skills framework
The Skills Framework for the Information Age (SFIA) Foundation has recognized two ISACA information security certifications as part of its IT skills framework.
More results...
The Skills Framework for the Information Age (SFIA) Foundation has recognized two ISACA information security certifications as part of its IT skills framework.
Canada’s McGill University has shut down a website that published confidential data on school donors, including names, addresses, phone numbers, and the amount they donated.
GFI Software’s report for February highlights two main issues: the incidence of rogue anti-virus is continuing to increase; and the Kelihos botnet ‘taken down’ last year is resurgent.
Anonymous has vowed to do a hack every Friday, calling it the #FFF campaign. Today AntiSec defaced the New York Ironworks, a police equipment supplier that describes itself as ‘NYC’s finest police equipment & tactical op’s gear store.’
Kaspersky Lab researcher Igor Soumenkov is asking for help in identifying a mystery code in the Duqu virus, the follow-on to Stuxnet uncovered last year.
The Obama administration on Wednesday simulated a cyber attack on the New York City power grid during a summer heat wave in an effort to convince US senators to pass comprehensive cybersecurity legislation.
Becrypt’s DISK Protect full-disk encryption product is the first commercial product to be granted CPA certification. By encrypting local authority laptops, it may help prevent the continuous leakage of personal data.
Trustwave, a Chicago-based security company with offices around the world, has signed a definitive agreement to acquire M86 Security, which is based in Irvine California and has international headquarters in London and R&D in California, Israel and New…
Only 34% of companies are strongly confident about quantifying the potential financial impact of a data breach, according to a report by security firm McAfee.
Nearly all of the successful phishing attacks against US banks exploit compromised infrastructure, according to data compiled by email security firm Agari.