Not All Pen Tests are Created Equal

Kevin Dawson, our CEO and President, shares his thoughts. Check out the original article on LinkedIn here.  Don’t get me wrong, penetration tests (or “pen tests”) are an important part of an overall information security plan. But not all pen tests are created equal, and a pen test is not the answer to everything. I […]

Leading the Way: Women In Cybersecurity

Grab a seat at our Live Virtual Roundtable: Female Trailblazers in Cybersecurity on August 25th at 1PM EDT! ISA Cybersecurity Inc. in partnership with CyberArk and Tenable, is hosting a virtual roundtable that brings together leading women in cybersecurity to address today’s pressing industry issues by highlighting women’s vital roles through powerful stories. Register today! No question, women in […]

Latest Cybersecurity News

cybersecurity news showing on a tablet on a table with a notebook and coffee

ISA is committed to keeping the security community up to date with the latest cybersecurity news.  Update: Charges laid in Twitter hack Just two weeks after a massive hack at Twitter, three individuals have been charged in connection with the incident. As we reported in late July, Twitter suffered a significant breach with some of […]

Why You Need an Incident Response Plan

“An incident response plan is a set of procedures, tools, and resources that your organization can use to recognize, respond, and recover from a cybersecurity attack or data breach.”   This is Part I of a three-part series on incident response planning as part of your overall information security plan. Part II details seven steps […]

Latest Cybersecurity News

cybersecurity news showing on a tablet on a table with a notebook and coffee

ISA is committed to keeping the security community up to date with the latest cybersecurity news.  Garmin hit by suspected ransomware attack Garmin, a global leader in the production of fitness trackers, smartwatches and other GPS-enabled wearable devices, was hit with a suspected ransomware attack on July 23 that shut down many of its global […]

Assessing Increasingly Complex IoT Threats

There has been a steady uptake of IoT as the number of organizations that use the technology increased from 13 to 25 percent between 2014 and 2017. Experts estimate that the global number of IoT connected devices will increase threefold to 43 billion between 2018 and 2023. Total spending on endpoints and IoT services will reach […]

BEC Fraud: From C-Suite To Finance

finance

Attackers are now increasingly targeting the accounts payable (AP) department, with an attempt to establish profound connection and trust with the AP personnel before launching an attack. The scam, which involves sending emails to impersonate legitimate vendors and employees, primarily targets enterprises that conduct wire transfers to local and oversea suppliers. Business email compromise (BEC) […]

Latest Cybersecurity News

cybersecurity news showing on a tablet on a table with a notebook and coffee

ISA is committed to keeping the security community up to date with the latest cybersecurity news.  Details slowly emerge regarding Twitter hack More information is coming to light about the Twitter hack on July 15. The social media giant suffered what is widely described as the most significant security breach in its history, with the […]

Mitigating the Cyber Risks of Remote Work

This is Part II of a two-part series on improving work-from-home security. Part I discussed how work-at-home employees can recognize and mitigate some of their cyber risks while working remotely.   Here in Part II, we detail some of the steps that businesses with distributed workforces can take to keep staff, clients, and overall operations […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.