Claudio Dodt

Cláudio Dodt is an Information Security Evangelist, consultant, trainer, speaker and blogger. He has more than ten years worth of experience working with Information Security, IT Service Management, IT Corporate Governance and Risk Management.
Claudio Dodt

9 tips for CISM exam success [updated 2022]

It is easy to understand why companies are in dire need of information security managers: Almost every day, new threats or vulnerabilities are discovered, an

Nine tips for CRISC exam success [updated 2022]

These are some of the most popular and best tips for successfully taking the CRISC exam.

Security+: implementing Identity and Access Management (IAM) controls [updated 2021]

The implementation of identity and access management controls is very important for your organization, and a major topic on the Security+ exam.

8 tips for CISSP exam success [updated 2021]

With preparation, you can pass the CISSP exam and upgrade your career status. Set yourself up for CISSP exam success with these tips.

The ultimate guide to CompTIA's Security+ certification [updated 2021]

The CompTIA Security+ certification is one of the best options for professionals wishing to start a career in information security. Learn why.

login  password

How to find weak passwords in your organization’s Active Directory

Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made

Are open-source security tools secure? Weighing the pros and cons

Introduction There is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but

How to align NICE Cybersecurity Workforce Framework KSAs with roles in your organization

Introduction Dealing with the many emerging cybersecurity challenges is a daunting task. With the ever-increasing number of attacks and cybercriminals that

Press enter button on the computer. business logistics Communication network World map send message Connect worldwide hand keyboard Communications network map of the world Blue map Dark blue background map world global logistics network

Top 8 world crises exploited by cybercriminals and lessons learned

Introduction Crises can vary immensely, be it in terms of the specific nature of each situation or the impacts that may be limited to a specific group — or e

Cookies: An overview of associated privacy and security risks

Anyone who regularly browses the internet must have seen some sort of pop-up or other form of alert about the use of cookies. Some sites even give you the op

OWASP top 10 A7: Insufficient attack protection

“Security  is always seen as too much until the day it’s not enough.” This quote by William H. Webster, an American attorney, jurist and current Chairman

10 tips for CISA exam success [updated 2019]

It is quite hard to think of a company that does not use any sort of information system as a basis for doing business. In fact, the actual standard for most