What To Do Before and After the CISSP Exam

Before we get to the celebration you’ll have after passing the CISSP, let’s look at some techniques to help you get through the exam. Two of the biggest mistakes people make are not treating it like a marathon and assuming that just because they work in IT or the computer industry, they know the one or more domains on the test and don’t need to study that material.

Read more

What To Do Before and After the CISSP Exam

Before we get to the celebration you’ll have after passing the CISSP, let’s look at some techniques to help you get through the exam. Two of the biggest mistakes people make are not treating it like a marathon and assuming that just because they work in IT or the computer industry, they know the one or more domains on the test and don’t need to study that material.

Read more

Following Security Best Practices is Good But May Not Be Enough

If you look at books and publications on cybersecurity, it’s clear that we continue to emphasize common information security best practices: Keep up with patches, disable unnecessary services, have users work with limited privilege, follow system hardening principles, and maintain an ongoing program of user education. Depending on the industry, there are guidelines, standards, or even federal regulations that drive cybersecurity. Unfortunately, as shown by Heartland Payment Systems and Target Stores, these standards are often viewed as encompassing security solutions, rather than baseline, minimal requirements.

Read more