February 2016
Computer Security Update;Feb2016, Vol. 17 Issue 2, p1
The article focuses on the launch of two Cybersecurity Nexus (CSX) tools by the Information System Audit and Control Association (ISACA) such as the Cybersecurity Career Road Map and the Threats and Controls. Topics discussed include the benefits offered by the tool to job seekers, the top three cyber threats in 2016 including social engineering, advanced persistent threats, and insider threats, and other threats in cybersecurity such as cybercrime, Malware, and watering hole.


Related Articles

  • ATACURI INFORMATICE ÃŽN SPAÈšIUL CIBERNETIC Åžl METODE DE CONTRACARARE A ACESTORA. MANEA, Valentin // Bulletin of the 'Carol I' National Defence University / Buletinu;Apr2013, Issue 2, p215 

    The main purpose of cyber attacks have remained the same as in the situation of classic attacks, namely expanding or extending the influence of a state or entity over a certain objective, but the means of achieving that have changed, becoming more subtle and at the same time harder to be...

  • Automated inference of past action instances in digital investigations. James, Joshua; Gladyshev, Pavel // International Journal of Information Security;Jun2015, Vol. 14 Issue 3, p249 

    As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance...

  • Reference Ontology for Cybersecurity Operational Information. TAKESHI TAKAHASHI; YOUKI KADOBAYASHI // Computer Journal;Oct2015, Vol. 58 Issue 10, p2297 

    As our cyber society develops and expands, the importance of cybersecurity operations is growing in response to cybersecurity threats coming from beyond national borders. Efficient cybersecurity operations require information exchanges that go beyond organizational borders. Various industry...

  • Security Budgets are Growing, But Still Too Slowly.  // Security: Solutions for Enterprise Security Leaders;Jun2016, Vol. 53 Issue 6, p14 

    The article reports on the increasing security budgets due to cybersecurity risks increase across various industries in the U.S., according to a survey conducted by the nonprofit body Institute of Information Security Professionals (IISP).

  • Rethink your cyber strategy. Tavakoli, Oliver // SC Magazine: For IT Security Professionals (15476693);Mar2015, Vol. 26 Issue 3, p15 

    The author reflects on the need for organizations to adopt prevention-focused information security strategies to thwart advanced persistent threats and match the complexities of the malware ecosystem.

  • Finjan Prevents Zero-Day Exploit.  // Database & Network Journal;Aug2009, Vol. 39 Issue 4, p26 

    The article reports on the discovery of zero-day exploit by Finjan Software Inc. It notes that the zero-day vulnerability (CVE-2009-1862) in Adobe Acrobat Reader and Flash player are exploited by cybercriminals. The exploit, which was detected by the Malicious Code Research Center of Finjan,...

  • Cybercrime Outranks Terrorism as Insurers' Most Feared Emerging Risk. Liebmann, Lenny // Insurance Broadcasting;11/14/2014, p1 

    A poll of insurance executives attending PCIA also found that suboptimal underwriting remains primary obstacle to corporate growth.

  • Auto engineer's site revs ICS. Madden, John // PC Week;03/09/98, Vol. 15 Issue 10, p14 

    Reports that the Society of Automotive Engineers (SAE) plans to use Oracle Corp.'s Internet Commerce Server (ICS) for its business and technical publishing systems as of July 1, 1998. Functions that ICS will perform; What attracted the SAE to ICS; Oracle's work with the SAE to create the look...

  • Type of Security Threats and It's Prevention. Ahmad, Ateeq // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 2, p750 

    Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics