Are you being safe when shopping online?
We have some top tips to stop you running in to any online shopping traps during the busy shopping period. The first piece of advice is to relax, don’t think that everything you do online is a trap, or someone trying to get something out of you. Breathe This is probably the most important part of online shopping. Take a moment to breathe and assess the situation. Even if you are in work and under pressure to complete a transaction, it’s better to take that moment to check what you are doing
OWASP 2023 Global AppSec Dublin (February 13-16)
Following a full house at OWASP 2022 Global AppSec in San Francisco, Fabio Cerullo will be delivering a highly interactive session on Web Application Security Essentials at OWASP 2023 Global AppSec Dublin This training has been updated to align with the recent changes to the OWASP Top 10 2021 – the world-renowned reference document that details the most critical security risks to web applications. This ensures that the course provides the most up to date knowledge for attendees. The course provides the knowledge and resources required to evaluate the security of web
Cybersecurity – What to expect in 2023
As the new year approaches it is interesting to speculate about how cybersecurity challenges and how they are addressed may change in 2023. Deloitte reveals 10 strategic cybersecurity predictions for 2023 Board cybersecurity readiness will become business imperative Connected device visibility and security will be a major area of focus for most organizations Security in emerging technologies will be critical in their adoption Data-centric security and privacy will become imperative to building brand and customer trust Focus of future-forward readiness Organizational resilience will continue to be the focus Complex supply chain
Team Training – Build critical cybersecurity skills and knowledge
Cybersecurity training is critical to developing essential skills and offering professionals the career paths they are looking for. Recruiting and retaining essential cybersecurity talent is challenging as the demand for candidates far outweighs supply. By prioritising training, organisations can build a team with the knowledge and expertise to defend themselves from cyberattacks and data breaches. For more than 15 years Cycubix has worked with clients to apply the latest knowledge and relevant skills to help protect their critical information. We have an in-depth understanding of the most current threat landscape, technologies
Understanding Secure Development for PCI DSS Compliance
In this article we look at the PCI DSS requirement for secure software development and why it is important, not just to achieve compliance, but to help prevent breaches and protect payment card information and other sensitive customer information. NOTE - PCI DSS update from V3.2.1 to V4.0: Changes in version V4.0 relating to Training for Software Development Personnel The training of software developers elements (previously Requirement 6.5 in V3.2.1) have been updated and restructured under Requirement 6.2.2 in PCI DSS v4. These changes ensure that the standard continues to be current
2022 (ISC)² Cybersecurity Workforce Study
The annual (ISC)² Cybersecurity Workforce Study assesses the size of the cybersecurity workforce, the demand for skilled individuals, and the shortfall in available talent. The 2022 (ISC)² Cybersecurity Workforce Study reveals that despite the number of cybersecurity professionals increasing, demand far exceeds supply and the workforce gap continues to grow. The study shows that the workforce has grown to 4.7 million, up 11% from a year ago, but the workforce gap has also increased - from 2.7 million to 3.4 million. The report provides insights for organisations on how they
Small to Medium Businesses: Digital Transformation and Cybersecurity
The recent study “Digital Perseverance and Growth: A SMB Study by Vodafone and Microsoft Ireland” highlights the critical role that digitisation places achieving business goals. Evidence shows that some of the benefits of digital adoption include productivity improvements, development of export markets, and increased customer satisfaction. The report also highlights the need for SMBs to increase their investment and training in cybersecurity to protect the business from financial and reputational damage. Almost half of the 250 SMBs that participated in the study reported that they had experienced a cybersecurity breach in
CISSP Mind Map
We have updated the Mind Map to reflect the refreshed CISSP Exam Outline effective June 1, 2022. This resource is designed to help students when studying for the CISSP exam. Use the mind map as a visual guide when reviewing the CISSP domains. Read more information and find out more about the next scheduled dates for (ISC)² Official Certified Information Systems Security Professional (CISSP) CBK Training Seminar. Remember that all (ISC)² members are eligible for a 10% discount – available until registration deadline. Click on the image or HERE to view the
Understanding PCI DSS Compliance Training Requirements
In this article we look at what training is required to comply with PCI DSS and why it is important, not just to achieve compliance, but to protect payment card information. Organisations that accept payment cards must understand and comply with Payment Card Industry (PCI) Data Security Standards. These standards, developed by the PCI Security Standards Council, made up of American Express, Discover Financial Services, JCB International, MasterCard and Visa, are designed to ensure that cardholder data is processed, stored, and transmitted securely and protected from misuse and fraud. What training is
(ISC)² Candidate – Enjoy membership benefits with no exam or experience requirements
(ISC)² has launched a new initiative - (ISC)² Candidate. (ISC)² Candidate has been created for those interested in pursuing an (ISC)² certification or a career in cybersecurity. It offers access to many of the benefits and resources that (ISC)² certified members and Associates of (ISC)² enjoy – but with no exam or work experience required. These benefits include - (ISC)² member pricing for pre-conference training ahead of (ISC)² Security Congress Access to the award-winning (ISC)² webinar channels Think Tank, Security Briefings, Knowledge Vault and sessions from previous (ISC)² Security Congress conferences (ISC)²