Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Security Tools

Welcome to the Security Tools topic!

Collaborate, contribute, consume and create knowledge around security tools used for vulneratiblity management (Nessus) and pen testing, as well as security linux distributions (Backtrack), and other security tools.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
705 Members
0 Online
8607 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 40 total

Must be a Topic member to contribute
View All »
Hello Guys I am searching for an email encryption service. In the scenario emails is hosted by a 3rd party and do not support encryption.The idea is to have an in house email server in the future but until then i am searching for a encryption solution ...
Frederico077 | 3/30/2018 12:50:35 AM | COMMENTS(1)
Does anyone have any experience with it, good or bad? We're about to do a proof of concept. The screenshots make it look more like a computer game than a serious security tool, but I don't want to be too prejudiced!
Andrew407 | 1/29/2018 9:13:40 AM | COMMENTS(1)
In 23 yrs as an IS Auditor I have done many technical tasks. In ISACA and other literature, I see NMAP listed as a free tool for network discovery/port scanning. I need to do an internal Network Administration and Security audit. I am hoping if you have u...
Chris A. Ward | 1/19/2018 10:10:40 AM | COMMENTS(3)
Does anyone know or have used any freeware scanning tool to audit the health of a website they can recommend? Thanks.
Senh | 1/5/2018 1:09:49 PM | COMMENTS(6)
Whose reports do you believe most in regard to security software and tools: Forrester, Gartner, NSS Labs or someone else?
Dragan Pleskonjic | 11/30/2017 1:09:05 PM | COMMENTS(2)
Can you share which tool(s) do you use for application security testing (for static i.e. SAST, dynamic i.e. DAST etc.) and how it performs?
Dragan Pleskonjic | 11/9/2017 4:48:08 PM | COMMENTS(5)

Documents & Publications: 35 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 808 days ago
Books
Posted by ISACA 853 days ago
Books
Posted by ISACA 974 days ago
Books
Posted by ISACA 1144 days ago

Events & Online Learning: 2 total

Journal Articles: 52 total

Volume 3, 2018
by Ed Moyle
Every year, ISACA conducts its annual Global State of Cybersecurity research. The second part of the survey asks about security practices in the field: what is working and what is not.
Volume 3, 2018
by Chip Jarnagin, CISSP, CSM, PMP, and Sonja Hammond, CISSP, ITIL Foundation, PCI-ISA
The exposure of data for up to 14 million of Verizon’s customers in July 2017 was an enormous embarrassment, particularly for an organization that presents itself as a premium cybersecurity consultancy.
Volume 3, 2018
by Aleksandr Kuznetcov, CISM
A SOC is a set of staff, processes, technologies and facilities that is primarily focused on identification (detection) and response to cybersecurity incidents that arise as a result of cybersecurity threat realizations.
Volume 2, 2018
by Dan Blum, CISSP
How the digital transformation turns out may depend on how well it supports core values such as prosperity, fairness, integrity, transparency and privacy atop an Internet that erodes some of these values.
Volume 2, 2018
by Keith Price, CISM, CGEIT, CISSP
In achieving cybersecurity protection objectives, it is important to focus on bigger-picture business processes rather than just the three pillars of confidentiality, integrity and availability.
Volume 1, 2018
by Larry Marks, CISA, CRISC, CISM, CGEIT, CFE, CISSP, CRVPM, CSTE, ITIL, PMP
The intent of this article is to outline a process to define a standard operational report for use cases to identify, monitor and respond to incidents and identify several security monitoring best practices.

Wikis: 2 total

Blog Posts: 8 total

Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
Yesterday’s security technology will not keep your network safe today, nor will today’s solutions protect you tomorrow. Network security must evolve. And at a rate that keeps it always one step ahead of the threats. These could include factors such as you...
Posted By : rasoolirfan | 1 comments
13 Nov 2014
Posted By : masarker | 4 comments
Follow @arthurhuamanic Después de una larga  caminata rumbo a mi piso, En el quiosco de la esquina me percate de una revista que me llamo mucho la atención era "Linux-Magazine" y de ahi empezaré a detallar un artículo de Michael Messner en la cual nos dem...
Posted By : ArthurHuamani | 0 comments