Ransomware Do’s And Don’ts

Ransomware Do’s And Don’ts

A company I worked for was hit with the CryptoLocker ransomware last year. In the aftermath, we found that some security measures were in place and others were not. We all hear that we need “best practices” in place every day to mitigate risks for events such as these. Are we reviewing our best practices [...]

New CSA Report Offers Observations, Recommendations on Connected Vehicle Security

New CSA Report Offers Observations, Recommendations on Connected Vehicle Security

Connected Vehicles are in the news for introducing new features and capabilities to the modern automobile. Headlines also highlight security hacks that compromise vehicle operations and usability. While sources note that the vulnerabilities identified so far have been addressed, a greater understanding is needed on how tomorrow’s Connected Vehicle will operate in an environment composed [...]

ISACA Chapter President Finds Creative Way to Spread GDPR Awareness

ISACA Chapter President Finds Creative Way to Spread GDPR Awareness

Editor’s note: ISACA Belgium Chapter President Marc Vael, CISA, CISM, CGEIT, CRISC, recently took a creative approach to spread awareness about General Data Protection Regulation (GDPR), spearheading a game about the coming regulations that will affect enterprises worldwide. Competitors can win the game by answering GDPR questions correctly and with a little luck with the [...]

Global Knowledge: ISACA Certifications Delivering Big Organizational and Personal Returns

Global Knowledge: ISACA Certifications Delivering Big Organizational and Personal Returns

One thing is certain: The need for cyber security professionals isn’t going away any time in the near future. As our digital footprint and the Internet of Things (IoT) continue to expand, we become increasingly vulnerable to having our private information poached with a single click, swipe or utterance. As a result, this is a [...]

Evasive Security Threats: How Well Do You Know Your Adversary?

Evasive Security Threats: How Well Do You Know Your Adversary?

Malicious actors are more resourceful than ever. They have learned the different techniques and processes used for malware analysis, and have created threats that can evade detection by traditional tools such as antivirus. Sun Tzu’s “The Art of War” states: “If you know the enemy and know yourself, you need not fear the result of [...]