Clear all search history
Law & Crime
Disasters & Accidents
War & Conflict
Hospitality & Recreation
ISACA articles over last 30 days
articles last 30 days
articles per day
Mentioned in this news
Criticism: A Security Chief's Most Valuable Resou...
This past week, a lesson about enterprise information security found its way to me via a somewhat unorthodox channel: specifically, an episode of Gordon Ramsay's Kitchen Nightmares. If you haven't...
Read more at TechNewsWorld.com
Latest from Twitter
Five Things Every Organisation Should Know re Cyb...
Advanced threats now target people—people have become your first line of defense. Cyberattacks are a business problem and a people problem, not just a technology problem. User education and awareness...
Read more at
Ernst & Young LLP
Cloud project risks: Five questions the board sho...
May 10, 2013, 6:48 AM PDT In a period when individual departments are just going out and buying software services - with or without IT’s blessing - international risk association
Read more at Techrepublic
ROLLING MEADOWS, Ill.: Five Questions Boards of D...
ROLLING MEADOWS, Ill. — The many benefits of cloud computing include helping enterprises become more efficient, agile, innovative and flexible, but achieving those benefits depends on a number of...
Read more at The Rock Hill Herald
CISOs should know business goals to embed securit...
... may already be secure with what I have, so just because I have a budget doesn't mean I go out and spend it on something. I believe in tools, but the problem is tools are seen as a panacea," Singh...
Read more at techcentral.ie
IDG News Service
ISACA Malta at Europe-Africa leadership event
Gian Carlo Millo represented the
Malta Chapter as vice-president in
’s 2013 Europe-Africa Leadership Conference in Tel Aviv last month. The two-day conference was attended by around 50...
Read more at Times of Malta
InfoSec: Understanding business goals is key to e...
Information security managers need to better align themselves with company business goals help embed security practices in an organisation, according to speakers at InfoSec 2013. By Matthew Finnegan...
Read more at
The Associated Press
Android: A Second Career in Security?
Did you know Julia Child was 37 before she learned to cook? It was a full decade later that she first set foot in front of a television camera. Before becoming the phenomenon we all know, she'd...
Read more at
Crypto guru: Don't blame users, get coders securi...
Infosec 2013 Experts on both sides of the vendor-customer divide in the UK and a US cryptographer are at odds over whether or not security training is a waste of time. American crypto guru Bruce...
Read more at
Quantifying risk (and why we are so bad at it
By Peter Bassill Part of the problem is our understanding of what risk is and how it can affect the day-to-day operation of a company, especially in a new and evolving area of risk. Our perceptions...
Read more at New Media Knowledge
Parts of this website powered by Open Calais, a toolkit for rich semantic metadata extraction.
Huh, what is this?
Interceder is a topic search engine aggregating the latest news on any topic into a single window of information. This page has been automatically generated. To contact Interceder
Your privacy is important. Interceder does not collect and keep any personal information about visitors to the site. Interceder may use third-party advertising companies to serve ads. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements on this website, other websites, and other forms of media about goods and services of interest to you.