Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Security Tools

Welcome to the Security Tools topic!

Collaborate, contribute, consume and create knowledge around security tools used for vulneratiblity management (Nessus) and pen testing, as well as security linux distributions (Backtrack), and other security tools.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
676 Members
1 Online
8311 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 36 total

Must be a Topic member to contribute
View All »
Whose reports do you believe most in regard to security software and tools: Forrester, Gartner, NSS Labs or someone else?
Dragan Pleskonjic | 11/30/2017 1:09:05 PM | COMMENTS(2)
Can you share which tool(s) do you use for application security testing (for static i.e. SAST, dynamic i.e. DAST etc.) and how it performs?
Dragan Pleskonjic | 11/9/2017 4:48:08 PM | COMMENTS(5)
Can you trust Gartner's 'Magic Quadrant' or other analysts' reports, when security testing tools are concerned?
Dragan Pleskonjic | 11/9/2017 1:07:33 PM | COMMENTS(0)
I want my fellow Information Security Professionals to be aware of a business issue with BlueCoat, who was purchased by Symantec. We purchased two BlueCoat SSL Decrypters to go along with two Cisco Firepower IPS appliances. Right after purchase, we were...
Denis Brooker | 10/21/2017 12:00:09 PM | COMMENTS(0)
Based on your work experience what are the best tools/softwarein each section?AuditEnterprise Security ManagementIT ForensicsPenetration Testing. VulnerabilityAssessment. Risk Assessmentencryption toolsRisk ManagementSecurity Event Managementthe recommend...
Elsayed | 7/17/2017 6:36:57 PM | COMMENTS(14)
Hi All I just came across this scanner for IoT. I would like to know if anyone had made use of RIoT and how was the experience Thanks
DK19 | 1/26/2017 8:37:02 PM | COMMENTS(0)

Documents & Publications: 37 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 645 days ago
Books
Posted by ISACA 691 days ago
Books
Posted by ISACA 811 days ago
Books
Posted by ISACA 981 days ago

Events & Online Learning: 2 total

Journal Articles: 45 total

Volume 4, 2017
by Ed Moyle
From email to calendaring to business applications, employees are, quite literally, doing business from any device, any time of the day or night, from anywhere and everywhere on the planet.
Volume 3, 2017
by Danelle Au
Asymmetric warfare is “the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent’s strengths while exploiting his weaknesses.”
Volume 3, 2017
by Sivarama Subramanian, CISA, and Balaji Swaminathan M., CISA, CISSP
During the Internet of Things (IoT) Village held at the DEF CON security conference in August 2016, 47 new vulnerabilities affecting 23 IoT devices from 21 manufacturers were disclosed.
Volume 3, 2017
by Steven J. Ross, CISA, CISSP, MBCP
At each stage in the evolution of information security, there has been a problem—access control, viruses, hackers, data leakage, to name a few—that has seemed insuperable.
Volume 2, 2017
by Ed Moyle
To understand how the business side of any organization intersects with technology, ask an internal auditor. This might sound counterintuitive at first, but think about what auditors need to know to do their job...
Volume 2, 2017
by Trevor J. Dildy, CCNA
Today’s enterprises have solutions in place to help with the detection and management of their information systems vulnerabilities, especially as it relates to system software and firmware.

Wikis: 2 total

Blog Posts: 7 total

Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
13 Nov 2014
Posted By : masarker | 4 comments
Follow @arthurhuamanic Después de una larga  caminata rumbo a mi piso, En el quiosco de la esquina me percate de una revista que me llamo mucho la atención era "Linux-Magazine" y de ahi empezaré a detallar un artículo de Michael Messner en la cual nos dem...
Posted By : ArthurHuamani | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments