February 2016
Computer Security Update;Feb2016, Vol. 17 Issue 2, p1
The article focuses on the launch of two Cybersecurity Nexus (CSX) tools by the Information System Audit and Control Association (ISACA) such as the Cybersecurity Career Road Map and the Threats and Controls. Topics discussed include the benefits offered by the tool to job seekers, the top three cyber threats in 2016 including social engineering, advanced persistent threats, and insider threats, and other threats in cybersecurity such as cybercrime, Malware, and watering hole.


Related Articles

  • Automated inference of past action instances in digital investigations. James, Joshua; Gladyshev, Pavel // International Journal of Information Security;Jun2015, Vol. 14 Issue 3, p249 

    As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance...

  • ATACURI INFORMATICE ÃŽN SPAÈšIUL CIBERNETIC Åžl METODE DE CONTRACARARE A ACESTORA. MANEA, Valentin // Bulletin of the 'Carol I' National Defence University / Buletinu;Apr2013, Issue 2, p215 

    The main purpose of cyber attacks have remained the same as in the situation of classic attacks, namely expanding or extending the influence of a state or entity over a certain objective, but the means of achieving that have changed, becoming more subtle and at the same time harder to be...

  • Reference Ontology for Cybersecurity Operational Information. TAKESHI TAKAHASHI; YOUKI KADOBAYASHI // Computer Journal;Oct2015, Vol. 58 Issue 10, p2297 

    As our cyber society develops and expands, the importance of cybersecurity operations is growing in response to cybersecurity threats coming from beyond national borders. Efficient cybersecurity operations require information exchanges that go beyond organizational borders. Various industry...

  • Rethink your cyber strategy. Tavakoli, Oliver // SC Magazine: For IT Security Professionals (15476693);Mar2015, Vol. 26 Issue 3, p15 

    The author reflects on the need for organizations to adopt prevention-focused information security strategies to thwart advanced persistent threats and match the complexities of the malware ecosystem.

  • Finjan Prevents Zero-Day Exploit.  // Database & Network Journal;Aug2009, Vol. 39 Issue 4, p26 

    The article reports on the discovery of zero-day exploit by Finjan Software Inc. It notes that the zero-day vulnerability (CVE-2009-1862) in Adobe Acrobat Reader and Flash player are exploited by cybercriminals. The exploit, which was detected by the Malicious Code Research Center of Finjan,...

  • Cybercrime Outranks Terrorism as Insurers' Most Feared Emerging Risk. Liebmann, Lenny // Insurance Broadcasting;11/14/2014, p1 

    A poll of insurance executives attending PCIA also found that suboptimal underwriting remains primary obstacle to corporate growth.

  • Auto engineer's site revs ICS. Madden, John // PC Week;03/09/98, Vol. 15 Issue 10, p14 

    Reports that the Society of Automotive Engineers (SAE) plans to use Oracle Corp.'s Internet Commerce Server (ICS) for its business and technical publishing systems as of July 1, 1998. Functions that ICS will perform; What attracted the SAE to ICS; Oracle's work with the SAE to create the look...

  • Type of Security Threats and It's Prevention. Ahmad, Ateeq // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 2, p750 

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain...

  • Cyber Security and Habeas Data: The Latin American Response to Information Security and Data Protection. Kobek, Luisa Parraguez; Caldera, Erick // OASIS - Observatorio de Análisis de los Sistemas Internacionale;jul-dec2016, Issue 24, p109 

    Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics