Information is the currency of the 21st century and the role of those who audit IT is more critical than ever. CNN Money recently said IT auditing is one of the fastest-growing careers. To help auditors handle their increasing demands and responsibilities, ISACA, a nonprofit association serving 100,000 IT professionals in 180 countries, publishes customizable IT audit/assurance programs for current issues, including social media and cybercrime. The newest from ISACA are:  

·         Cybercrime Audit/Assurance Program, which helps auditors provide management with an independent assessment of the effectiveness of cybercrime prevention and detection, and incident management.

Read more: ISACA Issues New Audit Programs on Cybercrime, Biometrics, E-commerce and VPN

 The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations for the Infosecurity Europe 2013 ‘Hall of Fame’ open.

For the last 5 years the medal of honour of the information security world has been presented to speakers of high renown with the ‘Hall of Fame’ at Infosecurity Europe. Voted for by fellow industry professionals the recipients of this most prestigious honour stand at the vanguard of the technological age. Possessing a wisdom that can only be gained through experience at the frontiers of the industry, any inductee to the Hall of Fame is guaranteed to impress, as the adorned walls of previous shows testify.

Read more: Infosecurity Europe 2013 Hall of Fame nominations now open

 ISACA, a global IT association with 100,000 members in 180 countries, teamed up with the American Institute of CPAs (AICPA) to issue a user guide on Service Organization Control ReportsSM  that help evaluate risk, reliability and compliance issues regarding outsourced tasks or functions. The guide, titled SOC 2SM User Guide for Report on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy, is available at www.isaca.org/SOC2.

Read more: ISACA and AICPA Issue SOC 2 User Guide

 The recent, and largest, cyber attack ever on a state government in the US, shows that attacks on third-party credentials - which can be used in identity theft frauds - are becoming more and more commonplace.

 The problem, says Andy Kemshall, chief technology officer at SecurEnvoy, is that public sector organisations in the US have a lot of identity information on citizens in their database, including payment card details.

 “US credentials such as the person’s social security number, name, address and payment card details, are pure gold when it comes to identity theft information, which has now become a global cybercriminal commodity business,” he said.

Read more: Largest-ever US public sector cyber attack is warning on the criminal value of customer credentials

 Security Policy Management Market Leader Achieves 1108% Growth Over the Past Five Years

Ramat Gan, Israel –October 30, 2012 –Tufin Technologies today announced that it has ranked eighth on the 2012 Deloitte Israel Technology Fast 50, a ranking of the 50 fastest growing technology companies in Israel. In 2011 Tufin landed the number one spot on the list and in 2010 it ranked second, making this the third year in a row that Tufin has topped Deloitte Israel’s prestigious list.  In a country often referred to as the ‘start-up nation’ known for producing some of the world’s most successful and innovative technology companies, ranking this high on Deloitte Israel’s list is a major accomplishment. Tufin’s placement in the top 8 for three years running makes this year’s achievement particularly noteworthy.

Read more: TUFIN RANKS EIGHTH IN THE 2012 DELOITTE TECHNOLOGY FAST 50, ITS THIRD TOP EIGHT RANKING IN THREE...