CISSP

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Guidance on Sharing Cyber Incident Information

Original release date: April 7, 2022

CISA’s Sharing Cyber Event Information Fact Sheet provides our stakeholders with clear guidance and information about what to share, who should share, and how to share information about unusual cyber incidents or activity.

CISA uses this information from partners to build a common understanding ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


You can’t keep quiet when you’re hacked anymore

If you try to hide that your business has been hacked or you’ve paid ransomware, the Cybersecurity and Infrastructure Security Agency would like a word with you.

One of the dirty little secrets of many businesses, perhaps even most, is that far more of them than ever admit to it ...

Continue Reading →
0

CISSP and Security+ are Available Online in April from RCTC

Rochester Community and Technical College is offering the following cybersecurity Exam Prep Courses this spring!  Please share with anyone who may be interested

For more information, please see ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CHANGES TO THE CISSP EXAM LENGTH COMING SOON

Beginning June 1, 2022, additional pretest items and time will be added to the CISSP exam for the Computerized Adaptive Testing (CAT) format.The current CISSP CAT exam contains 25 pretest (unscored) items. The addition of 25 more items will bring the total count to ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


NSA Releases Network Infrastructure Security Guidance

Original release date: March 3, 2022

The National Security Agency (NSA) has released a new Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance. The report captures best practices based on the depth and breadth of experience in supporting customers and responding to threats. Recommendations include perimeter and internal network ...

Continue Reading →
0

Identifying and Authenticating Internet of Things (IoT) Objects

by Arthur Rowley

Explore what identifying and authenticating IoT (Internet of Things) is all about. This article discusses schemes available for IoT identification and authentication in depth. You will also get to know why it is essential to carry out both processes.

IoT refers to technology known as the Internet of Things. It is a transformative and beneficial ...

Continue Reading →
0
Page 3 of 6 12345...»