COVID-19: Stopping the Spread of Misinformation
As a family business we share and understand your concerns in the current situation. Our primary hope is that everyone stays healthy and well. We are hugely grateful for those individuals on the frontline - united in healing, comforting and providing support to stop the spread of the virus. From health workers working 24/7, support personnel, civil servants, volunteers, public transport, teachers and parents continuing to educate in every way possible, humanitarians, drivers and pilots transporting personnel, materials and goods, communications and media, the list goes on and on. But stopping the
Risks of Cloud Computing Whitepaper
Even though the cloud is promoted as more secure than ever today, companies are experiencing an increasing number of data breaches. This white paper written by (ISC)², looks at cloud security challenges from the perspective of both Cloud Service Providers and customers and explains how cloud security training and certification can help organizations protect data and meet regulatory demands to ensure data privacy. Download Cloud Security Risks & How to Mitigate Them here. Check out the dates for our next (ISC)² Official Certified Cloud Security Professional (CCSP) CBK Training Seminar Remember that all
Why Prepare ISC2 Certifications with Official Provider
Before you put your trust in a cybersecurity certification training provider, it is important to know all the facts. Many training companies offer exam preparation for (ISC)² certifications, especially the CISSP, SSCP and CCSP – but not all are affiliated with (ISC)². It is important to know who you’re working with and understand the benefits of engaging an (ISC)² Official Training Provider. (ISC)² certifications are recognised as the gold standard in the industry and confirm comprehensive and professional knowledge critical to developing and protecting systems and data in business and working
Cost of Data Breach Ponemon Report 2019
The global average cost of a data breach now stands at $3.92 million, meaning it has increased 1.5 percent from 2018 and up 12 percent since 2014. An organisation is almost one-third more likely to experience a breach within two years than they were in 2014. Data breaches can have a significant and long-lasting impact on organisations. Lost business, regulatory fines and remediation costs result in data breaches having far reaching consequences. The Cost of a Data Breach Report 2019 - conducted by the Ponemon Institute and sponsored by IBM Security
Free Refresher with ISC2 CISSP Training Courses
This year marks (ISC)² ’s 30th anniversary. As an Official (ISC)² Training Provider, Cycubix is offering an exclusive promotion to help you achieve your cybersecurity certification goals now. Register by September 30th for our Official CISSP (ISC)² Training Seminar taking place October 14th - 18th, or confirm a Private Group CISSP Training for your organisation by that date and gain FREE access to an Online CISSP Refresher. These recordings will complement your training experience and give you extra time to review domain topics, so you can reinforce your knowledge prior to
ENISA becomes the European Union Agency for Cybersecurity
The European Union Agency for Cybersecurity - A new chapter for ENISA ENISA was established in March 2004 as the European Network and Information Security Agency, and has since been working to make Europe cyber secure. As such, the Agency worked closely together with Members States and other stakeholders to provide guidance and support to improve their cybersecurity capabilities. On Thursday 27 June 2019, the EU Cybersecurity Act (CSA) entered into force, and ENISA became the European Union Agency for Cybersecurity, with a new permanent mandate. The EU Cybersecurity Act gives ENISA a reinforced
Web Application Security Training Testimonial -Vincent Hopson
Name: Vincent Hopson Title: Field Applications Engineer Employer: Code Dx Location: Northpoint NY USA Education: Electrical Engineering Years in IT: 30+ years Years in cybersecurity: 15 (Mostly in Static Analysis, and Application Security) What were the Web Application Security skills or knowledge you were looking to develop and why? It had been a while since I had worked with security from a web-based perspective. This training course was a prime opportunity to learn about new strategies and techniques used in that world, and to see how those techniques relate to networked application security. What was it about the Web Application