(ISC)² Releases Set of Cybersecurity Tips for CEOs

(ISC)² Releases Set of Cybersecurity Tips for CEOs

To celebrate the 11th annual National Cyber Security Awareness Month (NCSAM), (ISC)² has released its fourth set of tips by security experts: cybersecurity tips for Chief Executive Officers (CEOs). “Two-factor authentication (something you have, know, or are) has become very important for system access. Passwords alone just do not cut it anymore. This is extremely [...]

Cybersecurity Challenges and Opportunities Twitter chat – #cybersecuritychat


Last week, ISACA hosted a Twitter chat focusing on cybersecurity challenges and opportunities in support of Cybersecurity Month. ISACA’s International President Robert E. Stroud and International Vice President Ramsés Gallego participated as our guest panel. Review excerpts from the chat below: ISACANews Q1: What are the top #cybersecurity threats facing organizations today? #cybersecuritychat   RobertEStroud [...]

9 New Features and Topics to Check Out in PAN-OS 6.1

9 New Features and Topics to Check Out in PAN-OS 6.1

The much anticipated PAN-OS 6.1 is finally here and with it, many new topics to read that describe new features and functionality. Here are some recommendations, hand-picked by the Technical Publications team, to add to your reading list. New Feature Documentation Local Signature Generation Support for WF-500 Appliances The WF-500 appliance can now generate signatures [...]

The New Face of (ISC)² Elections

The New Face of (ISC)² Elections

A Message from the Board Communications Committee on Board Elections This year the (ISC)² Board of Directors election process emerges after a massive year-long facelift. Through the recommendations of last year’s Board of Directors and the tenacity of the (ISC)² Management team, this year marks an unprecedented shift as the organization adjusts election processes based [...]

Examining a VBA-Initiated Infostealer Campaign

Examining a VBA-Initiated Infostealer Campaign

While Microsoft documents that leverage malicious, embedded Visual Basic for Applications (VBA) macros are not a new thing, their use has noticeably increased this year, thanks in part to their simplicity and effectiveness. Some threat actors commonly use this class of malware to drop a second stage payload on victim systems. Even though Microsoft attempts [...]