We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more...
Month: August 2016
We’ve had more than 4,000 threat researchers join us for LabyREnth, the first Unit 42 Capture the Flag (CTF) challenge,...
In June 2016, the Reserve Bank of India (RBI) sent to CEOs of Indian banks an important circular, the Cyber...
ISACA Now recently talked with Mark Kaigwa, African IT entrepreneur, about the future of IT in Africa. Kaigwa is a...
Over time, the term risk assessment has become so commonplace that it has almost lost its meaning and is now...