• The web portal for Cyber Security and Information

    Security Professionals

Popular Security Certifications:

Prev Next
About The CISSP Certification

About The CISSP Certification

CISSP® is the term used for the (Certified Information System Securi...

Free CISSP Practice exams

Free CISSP Practice exams

Multiple Exam practice tests that are always being updated.  Each qu...

About The CISSP Certification Exam

About The CISSP Certification Exam

The need for professionalism was a serious topic among computer secu...

About The CISSP Code of Ethics

About The CISSP Code of Ethics

All information systems security professionals who are certified by ...

Popular CISSP Exam FAQs

Popular CISSP Exam FAQs

The CISSP Exam FAQ is a series of questions gathered by CISSP.com to...

Computer Hacking Forensic Investigator Certification

Computer Hacking Forensic Investigator Certification

  What is a Computer Hacking Forensic Investigator? Computer ...

Certified Ethical Hacker Certification

Certified Ethical Hacker Certification

  What is an Ethical Hacker? To beat a hacker, you need to ...

Certified Information Systems Auditor Certification

Certified Information Systems Auditor Certification

Since 1978, the CISA certification has been a globally accepted stan...

Certified Information Security Manager Certification

Certified Information Security Manager Certification

Sought after by experienced information security managers, the CISM ...

Certified in Risk and Information Systems Control

Certified in Risk and Information Systems Control

Introduced in 2010, the CRISC certification is for IT and business p...

The Security Professionals Career Center

Security Professionals: Post your Resume for Free
  Employers / Agencies: Connect with Top Talents

The Security Professionals Career Center

Say Goodbye to your Bad Boss! Register Today.

Get a Job that fits you

Latest Security News

Prev Next
Hacked payment card service transmitted some data in plaintext

Hacked payment card service transmitted some data in plaintext

Charge Anywhere, a company that routes payment transactions between merchants and payment card processors, said that malicious software planted on its network may have accessed une...

Read more
Real time Cyber Attack Maps

Real time Cyber Attack Maps

Here is a list of the most popular real time cyber attack maps for your convenience. If you’re aware of another map, please tell us about it so we can add it. Real time Cyber Atta...

Read more
NIST Issues Update on Cybersecurity Framework, Highlights Priorities Moving Forward

NIST Issues Update on Cybersecurity Framework, Highlights Priorities Moving Forw…

On December 5, the National Institute of Standards and Technology (NIST) issued an update regarding its Framework for Improving Critical Infrastructure Cybersecurity (Framework).  ...

Read more
HIPAA settlement underscores the vulnerability of unpatched and unsupported software

HIPAA settlement underscores the vulnerability of unpatched and unsupported soft…

Anchorage Community Mental Health Services (ACMHS) has agreed to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rul...

Read more
Microsoft: NSA security fallout 'getting worse' ... 'not blowing over'

Microsoft: NSA security fallout 'getting worse' ... 'not blowing over'

Microsoft's top lawyer says the fallout of the NSA spying scandal is "getting worse," and carries grim implications for US tech companies. In a speech at the GigaOm Structure conf...

Read more
Facebook to let advertisers see where you're surfing

Facebook to let advertisers see where you're surfing

Remember back in 2011, when Mark Zuckerberg dissed Google, Yahoo and Microsoft for following you around on the web, using browser cookies to collect a huge amount of information ab...

Read more
Target’s Fall Guy: Is Your Board Prepared?

Target’s Fall Guy: Is Your Board Prepared?

Gregg Steinhafel, former Chairman and CEO of Target Corporation stepped down earlier this month. The primary reason stated was because of the continued fall-out from the 2013 massi...

Read more
After Bribery Scandal, High-Level Departures at Walmart

After Bribery Scandal, High-Level Departures at Walmart

Thomas A. Mars, formerly the chief administrative officer for Walmart in the United States, stepped down. José Luis Rodríguezmacedo Rivera, once the general counsel at Walmart’s Me...

Read more
Security experts in high demand at major US companies

Security experts in high demand at major US companies

Big companies including JPMorgan Chase and Pepsi are bringing on chief information security officers to limit their exposure to major hacks. The recent rash of corporate hacks has ...

Read more
Social Media Latest To Feel Security Flaw Impact

Social Media Latest To Feel Security Flaw Impact

These days it seems nothing is impervious to security flaws. This week’s discovery involved log-in tools OAuth and OpenID, leaving social-media users at risk. Facebook, Google+, Li...

Read more
Imposing Security: Computer programmers won’t stop making dangerous errors on their own

Imposing Security: Computer programmers won’t stop making dangerous errors on th…

Three computer bugs this year exposed passwords, e-mails, financial data, and other kinds of sensitive information connected to potentially billions of people. The flaws cropped up...

Read more
Why Humanitarians Should Pay Attention to Cybersecurity

Why Humanitarians Should Pay Attention to Cybersecurity

Most international staff I know who are working in the humanitarian field aren’t paying any attention to cybersecurity. Why is that? For starters, it’s an issue rooted in the secur...

Read more
Artist trademarks 'Pi' symbol, enrages the web

Artist trademarks 'Pi' symbol, enrages the web

Thousands of t-shirts, hats, sweatshirts and other items containing an ancient mathematical symbol were pulled from an online marketplace last week for allegedly...

Read more
Sim card flaws leave millions of mobile phones open to attack, hacker finds

Sim card flaws leave millions of mobile phones open to attack, hacker finds

If you thought government analysts intercepting your phone's metadata was bad, here is something potentially more frightening: cyber crooks hijacking your phone to eavesdrop, imper...

Read more
Edward Snowden Granted Asylum, Leaves Moscow Airport

Edward Snowden Granted Asylum, Leaves Moscow Airport

NSA whistleblower Edward Snowden has been granted temporary asylum in Russia for one year and has finally left Moscow’s Sheremetyevo airport.

Read more
California High Court Boosts Public-Records Law With Ruling on Mapping Data

California High Court Boosts Public-Records Law With Ruling on Mapping Data

California’s public-records law received a major boost Monday when the state Supreme Court decided local government must turn over mapping data without charging excessive fees.

Read more
Mugshot-Removal Sites Accused of Extortion

Mugshot-Removal Sites Accused of Extortion

The growing online mugshot-removal racket — where arrestees pay sometimes hundreds of dollars to remove their mugs — is being hit with extortion accusations in a novel lawsuit test...

Read more
Mugshot-Removal Sites Accused of Extortion

Mugshot-Removal Sites Accused of Extortion

The growing online mugshot-removal racket — where arrestees pay sometimes hundreds of dollars to remove their mugs — is being hit with extortion accusations in a novel lawsuit test...

Read more
RIAA Wants Infamous File-Sharer to Campaign Against Piracy

RIAA Wants Infamous File-Sharer to Campaign Against Piracy

Did you hear the one about the world’s most infamous music file-sharer being asked to publicly extol the virtues of the Recording Industry Association of America’s anti-piracy plat...

Read more
Report: Microsoft collaborated closely with NSA

Report: Microsoft collaborated closely with NSA

Most of the big tech companies implicated in the ongoing controversy over secret government Web surveillance insist they turned over data about users to the National Security Agenc...

Read more
NSA Surveillance Leaks Prompt Legislation

NSA Surveillance Leaks Prompt Legislation

Sen. Patrick Leahy (D-Vermont), the powerful chairman of the Senate Judiciary Committee, and other lawmakers today introduced legislation they say would provide more accountability...

Read more
In high-stakes hide-and-seek, Snowden keeps much of the world guessing

In high-stakes hide-and-seek, Snowden keeps much of the world guessing

In this high-stakes game of hide-and-seek, Edward Snowden appears to have the upper hand.

Read more
The New Digital Battlefield

The New Digital Battlefield

North Korea has claimed a cyber-savvy force of some 4,000 expert-level hackers thought responsible for the growing number of breaches in South Korea and her allies.

Read more
iOS device default hotspot passwords easy to crack

iOS device default hotspot passwords easy to crack

iOS users may be far more susceptible to being hacked when using Wi-Fi hotspot connections than they imagined.

Read more
Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As It Takes To Crack It

Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As It Ta…

If you use privacy tools, according to the apparent logic of the National Security Agency, it doesn’t much matter if you’re a foreigner or an American: Your communications are subj...

Read more
"Aaron's Law," to amend the CFAA, introduced in Congress

"Aaron's Law," to amend the CFAA, introduced in Congress

Lawmakers have unveiled companion bills in the House and Senate that would reform a federal anti-hacking law that critics believe is outdated and has enabled unnecessarily aggressi...

Read more
Yahoo’s Very Bad Idea to Release Email Addresses

Yahoo’s Very Bad Idea to Release Email Addresses

Yahoo is releasing inactive Yahoo IDs so that users can score a better email address. This means you can finally have albert@yahoo.com instead of albert9330399@yahoo.com, for examp...

Read more
Being great: Five critical CISO traits

Being great: Five critical CISO traits

In today's security environment, a lot is written about tools that will defeat the latest rash of malware and attacks, but very little is dedicated to every organization's most vit...

Read more
Apple considering bigger, cheaper iPhones

Apple considering bigger, cheaper iPhones

Apple is looking into launching iPhones with a 4.7-inch and a 5.7-inch screen, Reuters reports, citing sources with knowledge of the matter.

Read more
Why NSA IT Guy Edward Snowden Leaked Top Secret Documents

Why NSA IT Guy Edward Snowden Leaked Top Secret Documents

When the Washington Post described the person who leaked a NSA PowerPoint presentation about “PRISM” as a “career intelligence officer,” I was expecting the kind of 50-something te...

Read more

Copyright © 1998-2015 CISSP.COM, a division of CISSPs.com, LLC. All rights reserved. All trademarks are the property of their respective owners.
CISSP.COM P.O.Box 47955, Tampa, Fl, USA, 33646-7955