certification
![CISSP exam experience](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/10123919/cissp_exam_experience-400x200.webp)
How a GRC consultant passed the CISSP exam in six weeks
Ask any IT security professional which certification they would consider to be the “gold standard” in terms of prestige, credibility, or difficulty, and almost invariably they …
![CISSP](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/20181231/cissp2-400x200.webp)
How to prepare for the CISSP exam: Tips from industry leaders
The Certified Information Systems Security Professional (CISSP) is the most widely recognized certification in the information security industry. CISSP certifies that an …
![Why CISSP](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/09120942/why-cissp-1000-400x200.webp)
eBook: Why CISSP?
As new cyber threats emerge daily in our connected world, there’s never been a greater urgency for cybersecurity professionals than now. What can CISSP certification do for …
![Robin Long](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/06115347/robin_long-2-kiowa_security-400x200.jpg)
Key strategies for ISO 27001 compliance adoption
In this Help Net Security interview, Robin Long, founder of Kiowa Security, shares insights on how best to approach the implementation of the ISO/IEC 27001 information …
![ENISA](https://img.helpnetsecurity.com/wp-content/uploads/2024/02/01090241/enisa-1400-400x200.jpg)
EU adopts first cybersecurity certification scheme for safer tech
The European Commission adopted the implementing regulation concerning the EU cybersecurity certification scheme on Common Criteria (EUCC). The outcome aligns with the …
![computer](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/25163441/computer-1-400x200.jpg)
Balancing cybersecurity with convenience and progress
Changing approaches to cybersecurity have led to slow but steady progress in defense and protection. Still, competing interests create a growing challenge for cybersecurity …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07115823/locks-red-400x200.jpg)
Avoiding domain security risks when taking your business online
Unfortunately, as available domain extensions increase in variety (and uniqueness), so do security risks. In this Help Net Security video, Prudence Malinki, Head of Industry …
![Thorsten Hau](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110536/thorsten_hau-2-fidentity-400x200.jpg)
The misconceptions preventing wider adoption of digital signatures
In this Help Net Security interview, Thorsten Hau, CEO at fidentity, discusses the legal validity of qualified digital signatures, demonstrating their equivalence to …
![office](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/26141926/office1-400x200.jpg)
Unrealistic expectations exacerbate the cybersecurity talent shortage
Consumers believe today’s cybersecurity talent shortage is in large part due to limited exposure to the profession and a lack of cybersecurity education and training at a …
![Remote work](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/11204151/work_from_home-400x200.jpg)
Why cybersecurity is a blue-collar job
Cybersecurity has witnessed exponential growth in recent years, fueled by the increasing sophistication of cyber threats. As the demand for skilled professionals continues to …
![Lindsey Polley de Lopez](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/12134457/dr.lindsey_polley_de_lopez-2-mach37-400x200.jpg)
Overcoming the cybersecurity talent shortage with upskilling initiatives
In this Help Net Security interview, Dr. Lindsey Polley de Lopez, Director of Cyber & Space Intelligence at MACH37, proposes strategies for companies, educational …
![U.S. Cyber Trust Mark](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/19121737/us-cyber-trust-mark-1200-400x200.jpg)
U.S. Cyber Trust Mark labeling program raises the bar for smart devices’ cybersecurity
The Biden-Harris Administration has announced a cybersecurity certification and labeling program to help Americans more easily choose smart devices that are safer and less …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders