
ISACA CISM
The best resources for information security managers
Take advantage of these curated top resources and get CISM exam-ready while staying on top of the latest trends in information security management.

ISACA CISM
Maintaining your CISM certification: Renewal requirements
Learn what you need to maintain and renew your CISM certification.

ISACA CISM
CISM frequently asked questions (FAQ)
Given the importance of your CISM exam results, it’s no wonder you have concerns. If you are planning to take CISM certification test in the future, here are

Healthcare information security
How WannaCry Ransomware Crippled Healthcare
Perspective What do you get when you combine stolen government hacking tools, an unpatched system, and shady operatives from North Korea? The answer is one s

Digital forensics
Computer Forensics: Administrative Investigations and the CCFE Exam
Introduction One of the best ways to measure and evaluate the technological progressions of the modern age is to examine the evolution of digital forensics.

Penetration testing
Benefits of using a third-party pentesting company
Benefits of pentesting The process of penetration testing (pen testing) is one of the best ways to visualize one’s own computer system—including its potenti

Digital forensics
Computer Forensics: Multimedia and Content Forensics
Introduction Probably one of the most exciting and relevant fields in the computing world today is forensics. Much like its criminal namesake, computer foren

Digital forensics
Computer Forensics: Intellectual Property Investigations and the CCFE
Introduction The characteristics of cybercrime are always shifting, just like the laws that are passed to handle cybercrime. When something goes awry in the

Digital forensics
Computer Forensics: Forensic Issues with Virtual Systems
What is Virtual System Forensics? When something is virtual, it is almost the same as the original—but not quite. In computing, this emulation can be particu

Digital forensics
Computer Forensics: ICS/SCADA Forensics
Overview Control system security is the practice of using security methods to prevent intentional or unintentional interference with the operation of industr

Digital forensics
Computer Forensics: Big Data Forensics
What is Big Data? In the computing world, there’s data—and then there’s big data. Described as a collection of information from traditional and digital sourc

Phishing
Phishing Attacks in the Recreation Industry
Introduction When it comes to phishing schemes, the world of recreation may appear safer than more finance-oriented pursuits like banking, cloud storage, and