• Skip to main content

ITSecurity.org

Technology Security Controls

  • Main
  • Products
  • Services
    • Compliance-Services
      • ISO27001 Compliance
      • ISO22301 Compliance
      • ISO27002 Compliance
      • Data-Protection
      • GDPR
      • PCI-DSS Services
    • Identity and Access Management Services
      • IAM Design
      • IAM Policies & Standards
    • Incident Management Services
      • Emergency Incident Response
      • Forensic Support
      • Incident Response
    • Information Security Services
      • Information Security Consultancies
      • Information Security Governance Services
      • Information Security Policies & Standards
    • IT Risk Management Services
      • Risk Management Framework
      • Auditing
    • IT Security Consulting Services
      • IT Security Governance Services
      • IT Security Policies and Standards
    • Additional Security Services
      • Managed Security Services
      • Mobile Security
      • Network Security Services
    • Physical Security Services
      • Physical Security Reviews
    • Policies and Standards Services
    • Programme and Project Services
    • Risk Management Services
      • Risk Management – Framework
      • Risk Management Acceptance & Waivers
    • Security Awareness Services
      • Security Awareness – Phishing Responses
      • Phishing Responses
      • Security Awareness Training – Rebranded Security Training
      • Security Awareness Training – Generic
    • Security Design Services
      • All Security Design and Architectural Services
      • Cloud Security Review
      • Security Appliance Design and Configuration
    • Security Metrics Services
    • Technical Security Assessment Services
      • Penetration Testing – Our Penetration Test Services
      • Database Security – Databases and Repositories
      • Application Security Code Testing
      • Application Security Services
    • Third-Party and Supplier Assurance Services
      • Third and Supplier Party Assurance Methodology
      • Third and Supplier Party Assurance Review
      • Joint Venture Due Diligence
  • Security Digest
  • FAQ
  • Contact Us

Featured news

New infosec products of the week: November 20, 2020

November 20, 2020 by ITSecurity.Org Ltd

Filed Under: Amazon Web Services, AWS, Don't miss, Featured news, Group-IB, IT Security, kubernetes, News, Offensive Security, Qualys, Sysdig, Trilio, Zyxel Communications

Three years after WannaCry, what have we learned?

June 15, 2020 by ITSecurity.Org Ltd

Filed Under: CISO, cyber resilience, Cybercrime, cybersecurity, Don't miss, Editor's choice, Expert Analysis, Featured news, Hot stuff, IT Security, Malware, News, Opinion, Strategy, WannaCry

Can we safeguard the election infrastructure from cyber attacks?

June 15, 2020 by ITSecurity.Org Ltd

Filed Under: CyberAttack, cybersecurity, election security, Featured news, IT Security, News, survey, threats, Venafi

Complexity and size of DDoS attacks have increased

June 15, 2020 by ITSecurity.Org Ltd

Filed Under: CyberAttack, cybersecurity, ddos, Featured news, IT Security, News, threats, trends, Vulnerability

The impact of SD-WAN for securing public cloud adoption

June 15, 2020 by ITSecurity.Org Ltd

Filed Under: Barracuda Networks, cloud, cloud adoption, cyber risk, cybersecurity, Featured news, Google Cloud, IT Security, Microsoft Azure, network, News, SD-WAN, survey, threats, Vanson Bourne

There is a direct correlation between AI adoption and superior business outcomes

June 15, 2020 by ITSecurity.Org Ltd

Filed Under: artificial intelligence, automation, Featured news, IDC, investment, IT Security, News, Strategy, survey

Download: 2020 cybersecurity salary survey

December 10, 2019 by admin

The 2020 Cybersecurity Salary Survey provides insight into the details related to cybersecurity compensation. Over 1,500 security professionals completed the survey. Today you can access the aggregated and analyzed 2020 Cybersecurity Salary Survey Results and gain insight to the main ranges and factors of current cybersecurity salaries.

2020 cybersecurity salary survey

Using the survey results, any individual can go to the section relevant for his or her role and learn how their salary benchmarks against the respective range and factors, and then utilize this knowledge in any decision making process.

Key findings

  • Geolocation matters. Security analysts in NAM get a significantly higher salary than their counterparts in the EMEA and APAC, with more than 80% earning between 71K and 110K, in contrast to less than 35% in EMEA and 21% in APAC.
  • Degree doesn’t guarantee higher compensation. All analyzed positions feature a similar salary range distribution for both employees with or without a degree in computer science or a related engineering filed.
  • Banking and finance lead with payment range and distribution for both management and individual contribution positions.
  • Quality beats experience. Surprisingly, across all analyzed positions researchers found both individuals with little experience at the top of the payment curve and seasoned veterans at its bottom.
  • Pivoting pays. Individuals that pivoted from an IT position to a cybersecurity position earn more than their peers that started out in cybersecurity.
  • Bonuses are common practice. With the exception of security analysts, all other positions include periodic bonuses with annual 1%-10% as the leading pattern.
  • Women are hard to find. There is a significant shortage of women in security positions. The highest percentage is in the 20-29 age group with 6% in overall positions.
  • Women in management. Within the five analyzed positions, the highest percentage of women were found in the security director/manager position at 10%.

Read the survey results, get to know how your salary rates, and gain insights of your own.

Filed Under: Cynet, Don't miss, Featured news, IT Security, News, Webinars & whitepapers

Review: Cyber Smart

December 6, 2019 by admin

Cyber Smart

Do you believe you’re not interesting or important enough to be targeted by a cybercriminal? Do you think your personal data doesn’t hold any value? Bart R. McDonough proves why those beliefs are wrong in his book Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals.

McDonough, CEO and Founder of Agio, is a cybersecurity expert, speaker and author with more than 20 years of experience in the field, and this is his debut book.

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

He starts by debunking the most common cybersecurity myths, like the one mentioned above. Whether you like it or not, you are important, and your data is important. Also, everything has a price.

McDonough explains all the possible risks and threats you could encounter in a connected world, who are the bad actors, what their goals are and, most importantly, their attack methods.

The author presents five golden rules – or, as he calls them, “Brilliance in the Basics” habits – you should be complying with to maintain a good cybersecurity hygiene: update your devices, enable two-factor authentication, use a password manager, install and update antivirus software, and back up your data.

The second half of the book gives you detailed and specific recommendations on how to protect your:

  • Identity
  • Children
  • Money
  • Email
  • Files
  • Social media
  • Website access and passwords
  • Computer
  • Mobile devices
  • Home Wi-Fi
  • IoT devices
  • Your information when traveling.

McDonough doesn’t use scare tactics that could possibly make you want to forego all technology and go live in the woods. On the contrary, he wants you to embrace it and understand that even if the online world poses so many threats, there’s a lot you can do to protect yourself.

Who is this book for?

You don’t need to be a cybersecurity professional to understand this book. Its language is simple and it offers many comprehensible everyday examples and detailed tips. It’s a book you should definitely have in your home library, also for future reference.

The author has a very clear message: don’t just sit back and hope bad actors will pass you over. Be proactive and take all the possible and necessary steps to secure your data and your devices.

Filed Under: books, cybersecurity, Don't miss, Editor's choice, Featured news, Hot stuff, IT Security, News, review, Reviews, Spotlight

  • Page 1
  • Page 2
  • Next Page »